CVE-2025-3387
renrenio renren-security JSON cross site scripting
Severity Score
5.1
*CVSS v4
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
1
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Track*
*SSVC
Descriptions
A vulnerability classified as problematic has been found in renrenio renren-security up to 5.4.0. This affects an unknown part of the component JSON Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Es wurde eine Schwachstelle in renrenio renren-security bis 5.4.0 entdeckt. Sie wurde als problematisch eingestuft. Dabei betrifft es einen unbekannter Codeteil der Komponente JSON Handler. Dank der Manipulation mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.
*Credits:
VulDB Gitee Analyzer
CVSS Scores
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
System
Vulnerable | Subsequent
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Track*
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2025-04-07 CVE Reserved
- 2025-04-07 CVE Published
- 2025-04-08 CVE Updated
- 2025-04-08 First Exploit
- 2025-04-13 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
- CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://vuldb.com/?id.303633 | Vdb Entry |
URL | Date | SRC |
---|---|---|
https://gitee.com/renrenio/renren-security/issues/IBOU02 | 2025-04-08 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Renrenio Search vendor "Renrenio" | Renren-security Search vendor "Renrenio" for product "Renren-security" | 5.0 Search vendor "Renrenio" for product "Renren-security" and version "5.0" | en |
Affected
| ||||||
Renrenio Search vendor "Renrenio" | Renren-security Search vendor "Renrenio" for product "Renren-security" | 5.1 Search vendor "Renrenio" for product "Renren-security" and version "5.1" | en |
Affected
| ||||||
Renrenio Search vendor "Renrenio" | Renren-security Search vendor "Renrenio" for product "Renren-security" | 5.2 Search vendor "Renrenio" for product "Renren-security" and version "5.2" | en |
Affected
| ||||||
Renrenio Search vendor "Renrenio" | Renren-security Search vendor "Renrenio" for product "Renren-security" | 5.3 Search vendor "Renrenio" for product "Renren-security" and version "5.3" | en |
Affected
| ||||||
Renrenio Search vendor "Renrenio" | Renren-security Search vendor "Renrenio" for product "Renren-security" | 5.4 Search vendor "Renrenio" for product "Renren-security" and version "5.4" | en |
Affected
|