// For flags

CVE-2025-5179

Realce Tecnologia Queue Ticket Kiosk Cadastro de Administrador Page index.php cross site scripting

Severity Score

4.8
*CVSS v4

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

A vulnerability classified as problematic was found in Realce Tecnologia Queue Ticket Kiosk up to 20250517. Affected by this vulnerability is an unknown functionality of the file /adm/index.php of the component Cadastro de Administrador Page. The manipulation of the argument Name/Usuário leads to cross site scripting. The attack can be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way.

Se detectó una vulnerabilidad clasificada como problemática en Realce Tecnologia Queue Ticket Kiosk hasta la versión 20250517. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /adm/index.php del componente Cadastro de Administrador Page. La manipulación del argumento "Name/Usuário" provoca cross site scripting. El ataque puede ejecutarse en remoto. Se contactó al proveedor con antelación para informarle sobre esta vulnerabilidad, pero no respondió.

In Realce Tecnologia Queue Ticket Kiosk bis 20250517 wurde eine problematische Schwachstelle entdeckt. Betroffen ist eine unbekannte Verarbeitung der Datei /adm/index.php der Komponente Cadastro de Administrador Page. Dank Manipulation des Arguments Name/Usuário mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren.

*Credits: j369
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Attack Requirements
None
Privileges Required
High
User Interaction
Passive
System
Vulnerable | Subsequent
Confidentiality
None
None
Integrity
Low
None
Availability
None
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
Multiple
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2025-05-25 CVE Reserved
  • 2025-05-26 CVE Published
  • 2025-05-26 EPSS Updated
  • 2025-05-28 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
  • CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
References (2)
URL Tag Source
https://vuldb.com/?id.310267 Technical Description
https://vuldb.com/?submit.579852 Third Party Advisory
URL Date SRC
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
---- -