Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. cockpit-hq/cockpit
  4. ›
  5. CVE-2025-7053

CVE-2025-7053: Cockpit - Content Platform vulnerable to XSS through name or email argument names

July 4, 2025

A vulnerability was found in Cockpit versions up to 2.11.3. This issue affects some unknown processing instances of the file /system/users/save. The manipulation of the arguments “name” or “email” leads to cross-site scripting. The attack may be initiated remotely. Upgrading to version 2.11.4 will address this issue. It is recommended to upgrade the affected component. The vendor was contacted early about this disclosure and acted accordingly. A patch and new release were made available very quickly.

References

  • github.com/Cockpit-HQ/Cockpit
  • github.com/Cockpit-HQ/Cockpit/commit/bdcd5e3bc651c0839c7eea807f3eb6af856dbc76
  • github.com/Cockpit-HQ/Cockpit/releases/tag/2.11.4
  • github.com/advisories/GHSA-j4rj-fgcq-wmqp
  • nvd.nist.gov/vuln/detail/CVE-2025-7053
  • vuldb.com/?ctiid.314819
  • vuldb.com/?id.314819
  • vuldb.com/?submit.605594

Code Behaviors & Features

Detect and mitigate CVE-2025-7053 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2.11.4

Fixed versions

  • 2.11.4

Solution

Upgrade to version 2.11.4 or above.

Impact 3.5 LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Source file

packagist/cockpit-hq/cockpit/CVE-2025-7053.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 19 Aug 2025 12:18:37 +0000.