Published:2025/10/22 Last Updated:2025/10/22
JVN#46526244
GROWI vulnerable to cross-site scripting
Overview
GROWI provided by GROWI, Inc. contains a cross-site scripting vulnerability.
Products Affected
- GROWI v4.2.7 and earlier
Description
GROWI provided by GROWI, Inc. contains the following vulnerability.
- Cross-site scripting in the page alert function (CWE-79)
- CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N Base Score 5.1
- CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Base Score 6.1
- CVE-2025-54806
Impact
If a user accesses a crafted URL while logged in to the affected product, an arbitrary script may be executed on the user's web browser.
Solution
Update the Software
Update the software to the latest version according to the information provided by the developer.
The developer has released the following version to address this vulnerability.
- GROWI v4.2.8
Vendor Status
Vendor | Status | Last Update | Vendor Notes |
---|---|---|---|
GROWI, Inc. | Vulnerable | 2025/10/22 | GROWI, Inc. website |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Credit
GROWI, Inc. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and GROWI, Inc. coordinated under the Information Security Early Warning Partnership.
Other Information
JPCERT Alert |
|
JPCERT Reports |
|
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2025-54806 |
JVN iPedia |
JVNDB-2025-000084 |