{"uuid": "23d1984f-30c8-471a-bfe3-12caf9354db9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4011", "type": "seen", "source": "https://t.me/cvedetector/23901", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-4011 - Redmine Custom Query Handler Cross Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-4011 \nPublished : April 28, 2025, 9:15 a.m. | 1\u00a0hour, 57\u00a0minutes ago \nDescription : A vulnerability has been found in Redmine 6.0.0/6.0.1/6.0.2/6.0.3 and classified as problematic. This vulnerability affects unknown code of the component Custom Query Handler. The manipulation of the argument Name leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 6.0.4 is able to address this issue. It is recommended to upgrade the affected component. \nSeverity: 3.5 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-28T13:13:38.000000Z"}