CVE-2025-2123

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-2123
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-2123.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-2123
Related
Published
2025-03-09T15:15:36Z
Modified
2025-03-10T16:46:55.715644Z
Summary
[none]
Details

A vulnerability, which was classified as problematic, has been found in GeSHi up to 1.0.9.1. Affected by this issue is the function get_var of the file /contrib/cssgen.php of the component CSS Handler. The manipulation of the argument default-styles/keywords-1/keywords-2/keywords-3/keywords-4/comments leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

References

Affected packages

Debian:11 / geshi

Package

Name
geshi
Purl
pkg:deb/debian/geshi?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.0.9.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / geshi

Package

Name
geshi
Purl
pkg:deb/debian/geshi?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.0.9.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / geshi

Package

Name
geshi
Purl
pkg:deb/debian/geshi?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.0.9.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}