Home

Description

Xibo is an open source digital signage platform with a web content management system (CMS). Versions 4.3.0 and below contain a Remote Code Execution vulnerability in the CMS Developer menu's Module Templating functionality, allowing authenticated users with "System -> Add/Edit custom modules and templates" permissions to manipulate Twig filters and execute arbitrary server-side functions as the web server user. This issue is fixed in version 4.3.1. To workaround this issue, use the 4.1 and 4.2 patch commits.

PUBLISHED Reserved 2025-10-10 | Published 2025-11-04 | Updated 2025-11-05 | Assigner GitHub_M




HIGH: 7.2CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-94: Improper Control of Generation of Code ('Code Injection')

CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine

Product status

< 4.3.1
affected

References

github.com/...bo-cms/security/advisories/GHSA-7rmm-689c-gjgv

github.com/...ommit/0f4e88396111ea027785a48dd8f5eeb14536bd71

github.com/...ommit/ecd4f9d2cea739a46756a108a839cac80f65cf10

github.com/xibosignage/xibo-cms/releases/tag/4.3.1

patch-diff.githubusercontent.com/...xibo-cms/pull/3128.patch

cve.org (CVE-2025-62369)

nvd.nist.gov (CVE-2025-62369)

Download JSON