<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CVE-2025-13056</title><link>https://www.cvehunters.com/p/cve-2025-13056/</link><description>Cross-Site Scripting (XSS) Stored</description><atom:link href="https://www.cvehunters.com/p/cve-2025-13056/index.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2025-13056</title><link>https://www.cvehunters.com/p/cve-2025-13056/</link><guid>https://www.cvehunters.com/p/cve-2025-13056/</guid><description>&amp;lt;h2 id=&amp;#34;cve-2025-13056-cross-site-scripting-xss-stored&amp;#34;&amp;gt;CVE-2025-13056: Cross-Site Scripting (XSS) Stored
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-13056&amp;#34; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
&amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-13056&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A user with elevated privileges can inject XSS in the Administration ACL Menus configuration page.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Session hijacking: Stealing cookies or authentication tokens to impersonate users.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Credential theft: Harvesting usernames and passwords using malicious scripts.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Malware delivery: Distributing unwanted or harmful code to victims.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Privilege escalation: Compromising administrative users through persistent scripts.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Data manipulation or defacement: Changing or disrupting site content.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Reputation damage: Eroding trust among site users and administrators.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;</description><content:encoded>&amp;lt;h2 id=&amp;#34;cve-2025-13056-cross-site-scripting-xss-stored&amp;#34;&amp;gt;CVE-2025-13056: Cross-Site Scripting (XSS) Stored
&amp;lt;/h2&amp;gt;&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;CVE Publication: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://www.cve.org/CVERecord?id=CVE-2025-13056&amp;#34; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
&amp;gt;https://www.cve.org/CVERecord?id=CVE-2025-13056&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;h2 id=&amp;#34;summary&amp;#34;&amp;gt;Summary
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;A user with elevated privileges can inject XSS in the Administration ACL Menus configuration page.&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;impact&amp;#34;&amp;gt;Impact
&amp;lt;/h2&amp;gt;&amp;lt;p style=&amp;#34;text-align: justify;&amp;#34;&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Session hijacking: Stealing cookies or authentication tokens to impersonate users.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Credential theft: Harvesting usernames and passwords using malicious scripts.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Malware delivery: Distributing unwanted or harmful code to victims.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Privilege escalation: Compromising administrative users through persistent scripts.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Data manipulation or defacement: Changing or disrupting site content.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Reputation damage: Eroding trust among site users and administrators.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;reference&amp;#34;&amp;gt;Reference
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-13056-centreon-web-medium-severity-5358&amp;#34; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
&amp;gt;https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-13056-centreon-web-medium-severity-5358&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;h2 id=&amp;#34;finder&amp;#34;&amp;gt;Finder
&amp;lt;/h2&amp;gt;&amp;lt;p&amp;gt;&amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
&amp;gt;&amp;lt;img src=&amp;#34;/assets/contributors/50x50/marcelo50x50.png&amp;#34;
loading=&amp;#34;lazy&amp;#34;
/&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;http://www.linkedin.com/in/marceloqueirozjr&amp;#34; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
&amp;gt;Marcelo Queiroz&amp;lt;/a&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;By: &amp;lt;a class=&amp;#34;link&amp;#34; href=&amp;#34;https://github.com/CVE-Hunters/cve-hunters&amp;#34; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;noopener&amp;#34;
&amp;gt;CVE-Hunters&amp;lt;/a&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;</content:encoded><pubDate>Mon, 05 Jan 2026 00:00:00 +0000</pubDate></item></channel></rss>