Lookup for vulnerable packages by Package URL.
| Purl | pkg:maven/org.jboss.hal/hal-console@3.6.0.Final |
| Type | maven |
| Namespace | org.jboss.hal |
| Name | hal-console |
| Version | 3.6.0.Final |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | 3.7.11.Final |
| Latest_non_vulnerable_version | 3.7.11.Final |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-5du4-1bus-huhv |
| vulnerability_id |
VCID-5du4-1bus-huhv |
| summary |
Duplicate Advisory: Wildfly HAL Console Cross-Site Scripting
# Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-jhvj-f397-8w6q. This link is maintained to preserve external references.
# Original Description
A flaw was found in the HAL Console in the Wildfly component, which does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output used as a web page that is served to other users. The attacker must be authenticated as a user that belongs to management groups “SuperUser”, “Admin”, or “Maintainer”. |
| references |
|
| fixed_packages |
|
| aliases |
GHSA-5wjw-h8x5-v65m
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5du4-1bus-huhv |
|
| 1 |
| url |
VCID-8ew2-s4a9-u7cu |
| vulnerability_id |
VCID-8ew2-s4a9-u7cu |
| summary |
HAL Cross Site Scripting (XSS) vulnerability of user input when storing it in a data store
A flaw was found in the JBoss EAP Management Console, where a stored Cross-site scripting vulnerability occurs when an application improperly sanitizes user input before storing it in a data store. When this stored data is later included in web pages without adequate sanitization, malicious scripts can execute in the context of users who view these pages, leading to potential data theft, session hijacking, or other malicious activities.
### Impact
Cross-site scripting (XSS) vulnerability in the management console.
### Patches
Fixed in [HAL 3.7.11.Final](https://github.com/hal/console/releases/tag/v3.7.11)
### Workarounds
No workaround available |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-2901, GHSA-f7jh-m6wp-jm7f
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8ew2-s4a9-u7cu |
|
| 2 |
| url |
VCID-gkqy-w15q-jud2 |
| vulnerability_id |
VCID-gkqy-w15q-jud2 |
| summary |
HAL Console has a Cross Site Scripting (XSS) vulnerability of user input
A flaw was found in the HAL Console in the Wildfly component, which does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output used as a web page that is served to other users. The attacker must be authenticated as a user that belongs to management groups “SuperUser”, “Admin”, or “Maintainer”.
### Impact
Cross-site scripting (XSS) vulnerability in the management console.
### Patches
Fixed in [HAL 3.7.7.Final](https://github.com/hal/console/releases/tag/v3.7.7)
### Workarounds
No workaround available
### References
- https://access.redhat.com/security/cve/CVE-2025-23366
- https://bugzilla.redhat.com/show_bug.cgi?id=2337619 |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-23366 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47467 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47437 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47457 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47407 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47461 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47458 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47481 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47456 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47463 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47522 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47515 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-23366 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-23366, GHSA-jhvj-f397-8w6q
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gkqy-w15q-jud2 |
|
| 3 |
| url |
VCID-w155-te58-v3fy |
| vulnerability_id |
VCID-w155-te58-v3fy |
| summary |
Cross Site Scripting (XSS) vulnerability while uploading content to a new deployment
A vulnerability was found in the WildFly management console. A user may perform cross-site scripting in the deployment system. An attacker (or insider) may execute a malicious payload which could trigger an undesired behavior against the server.
### Impact
Cross-site scripting (XSS) vulnerability in the management console.
### Patches
Fixed in [HAL 3.7.7.Final](https://github.com/hal/console/releases/tag/v3.7.7)
### Workarounds
No workaround available
### References
See also: https://issues.redhat.com/browse/WFLY-19969 |
| references |
|
| fixed_packages |
|
| aliases |
GHSA-64gp-r758-8pfm
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-w155-te58-v3fy |
|
| 4 |
| url |
VCID-zufu-x8dx-xygs |
| vulnerability_id |
VCID-zufu-x8dx-xygs |
| summary |
Duplicate Advisory: HAL Cross Site Scripting (XSS) vulnerability of user input when storing it in a data store
# Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-f7jh-m6wp-jm7f. This link is maintained to preserve external references.
# Original Description
A flaw was found in the JBoss EAP Management Console, where a stored Cross-site scripting vulnerability occurs when an application improperly sanitizes user input before storing it in a data store. When this stored data is later included in web pages without adequate sanitization, malicious scripts can execute in the context of users who view these pages, leading to potential data theft, session hijacking, or other malicious activities. |
| references |
|
| fixed_packages |
|
| aliases |
GHSA-hp88-hfjw-2hg4
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zufu-x8dx-xygs |
|
|
| Fixing_vulnerabilities |
|
| Risk_score | 3.1 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:maven/org.jboss.hal/hal-console@3.6.0.Final |