Published:2025/11/06 Last Updated:2025/11/06
JVN#95942191
GROWI vulnerable to stored cross-site scripting
Overview
GROWI provided by GROWI, Inc. contains a stored cross-site scripting vulnerability.
Products Affected
- GROWI prior to v7.2.10
Description
GROWI provided by GROWI, Inc. contains the following vulnerability.
- Stored cross-site scripting (CWE-79)
- CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N Base Score 4.8
- CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N Base Score 5.4
- CVE-2025-61994
Impact
If a malicious user creates a page containing crafted contents, an arbitrary script may be executed on the web browser of a victim user who accesses the page.
Solution
Update the Software
Update the software to the latest version according to the information provided by the developer.
The developer has released the following version to address this vulnerability.
- GROWI v7.3.0
Vendor Status
| Vendor | Status | Last Update | Vendor Notes |
|---|---|---|---|
| GROWI, Inc. | Vulnerable | 2025/11/06 | GROWI, Inc. website |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Credit
Keitaro Yamazaki of GMO Cybersecurity by Ierae, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Other Information
| JPCERT Alert |
|
| JPCERT Reports |
|
| CERT Advisory |
|
| CPNI Advisory |
|
| TRnotes |
|
| CVE |
CVE-2025-61994 |
| JVN iPedia |
JVNDB-2025-000101 |