Search for vulnerabilities
| Vulnerability ID | VCID-sjfv-8z43-97fn |
| Aliases |
CVE-2023-25440
|
| Summary | Stored Cross Site Scripting (XSS) vulnerability in the add contact function CiviCRM 5.59.alpha1, allows attackers to execute arbitrary code in first/second name field. |
| Status | Published |
| Exploitability | 2.0 |
| Weighted Severity | 4.9 |
| Risk | 9.8 |
| Affected and Fixed Packages | Package Details |
| Reference id | Reference type | URL |
|---|---|---|
| https://api.first.org/data/v1/epss?cve=CVE-2023-25440 | ||
| https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25440 | ||
| 1036695 | https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036695 | |
| CiviCRM-5.59.alpha1-Cross-Site-Scripting.html | https://packetstormsecurity.com/files/172470/CiviCRM-5.59.alpha1-Cross-Site-Scripting.html | |
| civicrm.org | https://civicrm.org/ | |
| cpe:2.3:a:civicrm:civicrm:5.59:alpha1:*:*:*:*:*:* | https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:civicrm:civicrm:5.59:alpha1:*:*:*:*:*:* | |
| CVE-2023-25440 | Exploit | https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/51478.txt |
| CVE-2023-25440 | https://nvd.nist.gov/vuln/detail/CVE-2023-25440 |
| Data source | Exploit-DB |
|---|---|
| Date added | May 23, 2023 |
| Description | CiviCRM 5.59.alpha1 - Stored XSS (Cross-Site Scripting) |
| Ransomware campaign use | Unknown |
| Source publication date | May 23, 2023 |
| Exploit type | webapps |
| Platform | php |
| Source update date | May 23, 2023 |
| Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
| Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
| Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
| Percentile | 0.42902 |
| EPSS Score | 0.00204 |
| Published At | July 30, 2025, 12:55 p.m. |
| Date | Actor | Action | Source | VulnerableCode Version |
|---|---|---|---|---|
| 2025-07-31T09:32:02.428854+00:00 | Vulnrichment | Import | https://github.com/cisagov/vulnrichment/blob/develop/2023/25xxx/CVE-2023-25440.json | 37.0.0 |