We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-30223

Beego allows Reflected/Stored XSS in Beego's RenderForm() Function Due to Unescaped User Input



Description

Beego is an open-source web framework for the Go programming language. Prior to 2.3.6, a Cross-Site Scripting (XSS) vulnerability exists in Beego's RenderForm() function due to improper HTML escaping of user-controlled data. This vulnerability allows attackers to inject malicious JavaScript code that executes in victims' browsers, potentially leading to session hijacking, credential theft, or account takeover. The vulnerability affects any application using Beego's RenderForm() function with user-provided data. Since it is a high-level function generating an entire form markup, many developers would assume it automatically escapes attributes (the way most frameworks do). This vulnerability is fixed in 2.3.6.

Reserved 2025-03-18 | Published 2025-03-31 | Updated 2025-03-31 | Assigner GitHub_M


CRITICAL: 9.3CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

< 2.3.6
affected

References

github.com/.../beego/security/advisories/GHSA-2j42-h78h-q4fg

github.com/...ommit/939bb18c66406466715ddadd25dd9ffa6f169e25

cve.org (CVE-2025-30223)

nvd.nist.gov (CVE-2025-30223)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-30223

Support options

Helpdesk Chat, Email, Knowledgebase