A flaw was found in Stackrox, where it is vulnerable to Cross-site scripting (XSS) if the script code is included in a small subset of table cells. The only known potential exploit is if the script is included in the name of a Kubernetes “Role” object* that is applied to a secured cluster. This object can be used by a user with access to the cluster or through a compromised third-party product.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/security/cve/CVE-2025-5198 | Third Party Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2368568 | Issue Tracking Third Party Advisory |
| https://github.com/stackrox/stackrox/pull/13336 |
Configurations
History
No history.
Information
Published : 2025-05-27 21:15
Updated : 2025-07-30 20:15
NVD link : CVE-2025-5198
Mitre link : CVE-2025-5198
CVE.ORG link : CVE-2025-5198
JSON object : View
Products Affected
redhat
- advanced_cluster_security
stackrox
- stackrox
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
