Source: geshi Version: 1.0.9.1-1 Severity: important Tags: security upstream Forwarded: https://github.com/GeSHi/geshi-1.0/issues/159 X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi, The following vulnerability was published for geshi. CVE-2025-2123[0]: | A vulnerability, which was classified as problematic, has been found | in GeSHi up to 1.0.9.1. Affected by this issue is the function | get_var of the file /contrib/cssgen.php of the component CSS | Handler. The manipulation of the argument default- | styles/keywords-1/keywords-2/keywords-3/keywords-4/comments leads to | cross site scripting. The attack may be launched remotely. The | exploit has been disclosed to the public and may be used. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2025-2123 https://www.cve.org/CVERecord?id=CVE-2025-2123 [1] https://github.com/GeSHi/geshi-1.0/issues/159 Regards, Salvatore