{"id":"CVE-2025-27208","details":"A reflected Cross-Site Scripting (XSS) vulnerability has been identified in Revive Adserver version 5.5.2. An attacker could trick a user with access to the user interface of a Revive Adserver instance into clicking on a specifically crafted URL and execute injected JavaScript code in the context of the victim's browser.  The session cookie cannot be accessed, but a number of other operations could be performed.\r\n\r\nThe vulnerability is present in the admin-search.php file and can be exploited via the compact parameter.","modified":"2026-04-10T05:23:48.977216Z","published":"2025-10-31T00:15:36.190Z","references":[{"type":"FIX","url":"https://hackerone.com/reports/3091390"},{"type":"FIX","url":"http://seclists.org/fulldisclosure/2025/Oct/20"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/revive-adserver/revive-adserver","events":[{"introduced":"0"},{"fixed":"d30dee449a2da3d687c66fc4c162ed0b3e39482c"},{"introduced":"0"},{"last_affected":"431ea440faf1a31ae26192cb7b37fae51b5bfbf9"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"6.0.0"},{"introduced":"0"},{"last_affected":"6.0.0-rc1"}]}}],"versions":["v3.0.0","v3.0.1","v3.0.2","v3.0.3","v3.1.0","v3.1.0-beta","v3.2.0","v3.2.0-beta","v3.2.1","v3.2.1-rc1","v4.0.0","v4.0.0-rc1","v4.0.1","v4.0.2","v4.1.0","v4.1.0-rc1","v4.1.2","v4.1.3","v4.1.4","v4.2.0","v4.2.0-rc1","v4.2.1","v5.0.0","v5.0.0-rc1","v5.0.1","v5.0.3","v5.0.4","v5.0.5","v5.1.0","v5.1.0-rc1","v5.1.1","v5.2.0","v5.2.1","v5.3.0","v5.3.0-rc1","v5.4.0","v5.4.0-rc1","v5.4.1","v6.0.0-rc1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-27208.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}