Home

Description

The Request Tracker software is vulnerable to a Stored XSS vulnerability in calendar invitation parsing feature, which displays invitation data without HTML sanitization. XSS vulnerability allows an attacker to send a specifically crafted e-mail enabling JavaScript code execution by displaying the ticket in the context of the logged-in user. This vulnerability affects versions from 5.0.4 through 5.0.8 and from 6.0.0 through 6.0.1.

PUBLISHED Reserved 2025-08-19 | Published 2025-10-24 | Updated 2025-10-24 | Assigner CERT-PL




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')

Product status

Default status
unaffected

5.0.4 (custom)
affected

6.0.0 (custom)
affected

Credits

Mateusz Szymaniec (CERT Polska) finder

References

cert.pl/en/posts/2025/10/CVE-2025-9158/ third-party-advisory

requesttracker.com/request-tracker/ product

cve.org (CVE-2025-9158)

nvd.nist.gov (CVE-2025-9158)

Download JSON