CVE-2025-47204

An issue was discovered in post.php in bootstrap-multiselect (aka Bootstrap Multiselect) 1.1.2. A PHP script in the source code echoes arbitrary POST data. If a developer adopts this structure wholesale in a live application, it could create a Reflective Cross-Site Scripting (XSS) vulnerability exploitable through Cross-Site Request Forgery (CSRF).
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

cpe:2.3:a:davidstutz:bootstrap_multiselect:1.1.2:*:*:*:*:*:*:*

History

09 Jul 2025, 02:02

Type Values Removed Values Added
First Time Davidstutz bootstrap Multiselect
Davidstutz
CPE cpe:2.3:a:davidstutz:bootstrap_multiselect:1.1.2:*:*:*:*:*:*:*
References () https://github.com/projectdiscovery/nuclei-templates/commit/11e1a6c11d3954f44acfb0274b6dad4bd8045103 - () https://github.com/projectdiscovery/nuclei-templates/commit/11e1a6c11d3954f44acfb0274b6dad4bd8045103 - Patch
References () https://github.com/davidstutz/bootstrap-multiselect/releases - () https://github.com/davidstutz/bootstrap-multiselect/releases - Release Notes

13 May 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-13 16:15

Updated : 2025-07-09 02:02


NVD link : CVE-2025-47204

Mitre link : CVE-2025-47204


JSON object : View

Products Affected

davidstutz

  • bootstrap_multiselect
CWE

No CWE.