CVE-2025-4495

A vulnerability has been found in JAdmin-JAVA JAdmin 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /memoAjax/save. The manipulation of the argument ID leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://github.com/JAdmin-JAVA/JAdmin/issues/2 Exploit Issue Tracking Third Party Advisory
https://github.com/JAdmin-JAVA/JAdmin/issues/2#issue-3012512653 Exploit Issue Tracking Third Party Advisory
https://vuldb.com/?ctiid.308209 Permissions Required VDB Entry
https://vuldb.com/?id.308209 Third Party Advisory VDB Entry
https://vuldb.com/?submit.566985 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:jadmin-java:jadmin:1.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-05-10 01:15

Updated : 2025-10-10 18:00


NVD link : CVE-2025-4495

Mitre link : CVE-2025-4495

CVE.ORG link : CVE-2025-4495


JSON object : View

Products Affected

jadmin-java

  • jadmin
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-94

Improper Control of Generation of Code ('Code Injection')