CVE-2025-4551

LOW

Continew Admin < 3.6.0 - Code Injection

Title source: rule
STIX 2.1

Description

A vulnerability, which was classified as problematic, was found in ContiNew Admin up to 3.6.0. Affected is an unknown function of the file /dev-api/common/file. The manipulation of the argument File leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

References (4)

Core 4
Core References
Third Party Advisory, VDB Entry vdb-entry technical-description
https://vuldb.com/?id.308298
Permissions Required, VDB Entry signature permissions-required
https://vuldb.com/?ctiid.308298
Third Party Advisory, VDB Entry third-party-advisory
https://vuldb.com/?submit.567568

Scores

CVSS v3 3.5
EPSS 0.0015
EPSS Percentile 35.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-94 CWE-79
Status published
Products (1)
continew/continew_admin < 3.6.0
Published May 11, 2025
Tracked Since Feb 18, 2026