We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
KUNBUS PiCtory version 2.11.1 and earlier are vulnerable when an authenticated remote attacker crafts a special filename that can be stored by API endpoints. That filename is later transmitted to the client in order to show a list of configuration files. Due to a missing escape or sanitization, the filename could be executed as HTML script tag resulting in a cross-site-scripting attack.
Reserved 2025-04-17 | Published 2025-05-01 | Updated 2025-05-02 | Assigner icscertAdam Bromiley of Pen Test Partners reported these vulnerabilities to CISA.
www.cisa.gov/news-events/ics-advisories/icsa-25-121-01
packages.revolutionpi.de/pool/main/p/pictory/
Support options