Upstream information

CVE-2025-53883 at MITRE

Description

A Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability allows attackers to run arbitrary javascript via a reflected XSS issue in the search fields.This issue affects Container suse/manager/5.0/x86_64/server:latest: from ? before 5.0.28-150600.3.36.8; SUSE Manager Server LTS 4.3: from ? before 4.3.88-150400.3.113.5.

Other Security Trackers

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v4 Scores
CVSS detail CNA (SUSE) SUSE
Base Score 9.3 9.3
Vector CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:N/SC:H/SI:H/SA:H
Attack Vector Network Network
Attack Complexity Low Low
Attack Requirements None None
Privileges Required Low Low
User Interaction Passive Passive
Vulnerable System Confidentiality Impact High High
Vulnerable System Integrity Impact High High
Vulnerable System Availability Impact None None
Subsequent System Confidentiality Impact High High
Subsequent System Integrity Impact High High
Subsequent System Availability Impact High High
CVSSv4 Version 4.0 4.0
SUSE Bugzilla entry: 1246439 [NEW]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
Container suse/manager/4.3/proxy-httpd:4.3.16.1.9.70.2
  • python3-rhnlib >= 4.3.7-150400.3.9.4
  • release-notes-susemanager-proxy >= 4.3.16.1-150400.3.101.2
  • spacewalk-backend >= 4.3.34-150400.3.58.6
  • susemanager-tftpsync-recv >= 4.3.11-150400.3.15.3
Container suse/manager/5.0/x86_64/proxy-httpd:5.0.5.1.7.26.2
  • python3-rhnlib >= 5.0.5-150600.4.6.4
  • release-notes-susemanager-proxy >= 5.0.5.1-150600.11.31.1
  • spacewalk-backend >= 5.0.15-150600.4.20.9
  • susemanager-tftpsync-recv >= 5.0.3-150600.3.6.4
Container suse/manager/5.0/x86_64/server-attestation:5.0.5.1.6.30.2
  • uyuni-coco-attestation-core >= 5.0.7-150600.3.9.2
  • uyuni-coco-attestation-module-secureboot >= 5.0.7-150600.3.9.2
  • uyuni-coco-attestation-module-snpguest >= 5.0.7-150600.3.9.2
  • uyuni-java-common >= 5.0.7-150600.3.9.2
Container suse/manager/5.0/x86_64/server:5.0.5.1.7.33.2
  • python3-rhnlib >= 5.0.5-150600.4.6.4
  • release-notes-susemanager >= 5.0.5.1-150600.11.42.2
  • saltboot-formula >= 0.1.1750679229.f368550-150600.3.9.2
  • spacewalk-backend >= 5.0.15-150600.4.20.9
  • spacewalk-backend-app >= 5.0.15-150600.4.20.9
  • spacewalk-backend-iss >= 5.0.15-150600.4.20.9
  • spacewalk-backend-iss-export >= 5.0.15-150600.4.20.9
  • spacewalk-backend-package-push-server >= 5.0.15-150600.4.20.9
  • spacewalk-backend-server >= 5.0.15-150600.4.20.9
  • spacewalk-backend-sql >= 5.0.15-150600.4.20.9
  • spacewalk-backend-sql-postgresql >= 5.0.15-150600.4.20.9
  • spacewalk-backend-tools >= 5.0.15-150600.4.20.9
  • spacewalk-backend-xml-export-libs >= 5.0.15-150600.4.20.9
  • spacewalk-backend-xmlrpc >= 5.0.15-150600.4.20.9
  • spacewalk-base >= 5.0.22-150600.3.30.10
  • spacewalk-base-minimal >= 5.0.22-150600.3.30.10
  • spacewalk-base-minimal-config >= 5.0.22-150600.3.30.10
  • spacewalk-html >= 5.0.22-150600.3.30.10
  • spacewalk-java >= 5.0.28-150600.3.36.8
  • spacewalk-java-config >= 5.0.28-150600.3.36.8
  • spacewalk-java-lib >= 5.0.28-150600.3.36.8
  • spacewalk-java-postgresql >= 5.0.28-150600.3.36.8
  • spacewalk-search >= 5.0.5-150600.3.9.2
  • spacewalk-taskomatic >= 5.0.28-150600.3.36.8
  • susemanager-build-keys >= 15.5.3-150600.5.12.1
  • susemanager-build-keys-web >= 15.5.3-150600.5.12.1
  • susemanager-sls >= 5.0.17-150600.3.22.1
  • uyuni-config-modules >= 5.0.17-150600.3.22.1
Image SLES15-SP4-Manager-Proxy-4-3-BYOS
Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure
Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2
Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE
  • python3-rhnlib >= 4.3.7-150400.3.9.4
  • release-notes-susemanager-proxy >= 4.3.16.1-150400.3.101.2
  • spacewalk-backend >= 4.3.34-150400.3.58.6
  • spacewalk-base-minimal >= 4.3.46-150400.3.63.5
  • spacewalk-base-minimal-config >= 4.3.46-150400.3.63.5
  • susemanager-build-keys >= 15.4.11-150400.3.38.1
  • susemanager-build-keys-web >= 15.4.11-150400.3.38.1
SUSE Manager Server LTS 4.3
  • python3-rhnlib >= 4.3.7-150400.3.9.4
  • release-notes-susemanager >= 4.3.16.1-150400.3.143.2
  • spacewalk-backend >= 4.3.34-150400.3.58.6
  • spacewalk-backend-app >= 4.3.34-150400.3.58.6
  • spacewalk-backend-applet >= 4.3.34-150400.3.58.6
  • spacewalk-backend-config-files >= 4.3.34-150400.3.58.6
  • spacewalk-backend-config-files-common >= 4.3.34-150400.3.58.6
  • spacewalk-backend-config-files-tool >= 4.3.34-150400.3.58.6
  • spacewalk-backend-iss >= 4.3.34-150400.3.58.6
  • spacewalk-backend-iss-export >= 4.3.34-150400.3.58.6
  • spacewalk-backend-package-push-server >= 4.3.34-150400.3.58.6
  • spacewalk-backend-server >= 4.3.34-150400.3.58.6
  • spacewalk-backend-sql >= 4.3.34-150400.3.58.6
  • spacewalk-backend-sql-postgresql >= 4.3.34-150400.3.58.6
  • spacewalk-backend-tools >= 4.3.34-150400.3.58.6
  • spacewalk-backend-xml-export-libs >= 4.3.34-150400.3.58.6
  • spacewalk-backend-xmlrpc >= 4.3.34-150400.3.58.6
  • spacewalk-base >= 4.3.46-150400.3.63.5
  • spacewalk-base-minimal >= 4.3.46-150400.3.63.5
  • spacewalk-base-minimal-config >= 4.3.46-150400.3.63.5
  • spacewalk-html >= 4.3.46-150400.3.63.5
  • spacewalk-java >= 4.3.88-150400.3.113.5
  • spacewalk-java-config >= 4.3.88-150400.3.113.5
  • spacewalk-java-lib >= 4.3.88-150400.3.113.5
  • spacewalk-java-postgresql >= 4.3.88-150400.3.113.5
  • spacewalk-taskomatic >= 4.3.88-150400.3.113.5
  • susemanager-build-keys >= 15.4.11-150400.3.38.1
  • susemanager-build-keys-web >= 15.4.11-150400.3.38.1
  • susemanager-sls >= 4.3.50-150400.3.68.1
  • uyuni-config-modules >= 4.3.50-150400.3.68.1
Patchnames:
SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-3826
SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-3827


First public cloud image revisions this CVE is fixed in:


Status of this issue by product and package

Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification. The updates are grouped by state of their lifecycle. SUSE product lifecycles are documented on the lifecycle page.

Product(s) Source package State
Products under general support and receiving all security fixes.
SUSE Manager Server Module 4.3 spacewalk-java Already fixed
Products under Long Term Service Pack support and receiving important and critical security fixes.
SUSE Manager Proxy 4.3 release-notes-susemanager-proxy Affected
SUSE Manager Proxy LTS 4.3 release-notes-susemanager-proxy Released
SUSE Manager Retail Branch Server 4.3 release-notes-susemanager-proxy Affected
SUSE Manager Retail Branch Server LTS 4.3 release-notes-susemanager-proxy Released
SUSE Manager Server 4.3 release-notes-susemanager Affected
SUSE Manager Server LTS 4.3 release-notes-susemanager Released
SUSE Manager Server LTS 4.3 rhnlib Released
SUSE Manager Server LTS 4.3 spacewalk-backend Released
SUSE Manager Server LTS 4.3 spacewalk-java Released
SUSE Manager Server LTS 4.3 spacewalk-web Released
SUSE Manager Server LTS 4.3 susemanager-build-keys Released
SUSE Manager Server LTS 4.3 susemanager-sls Released
Products past their end of life and not receiving proactive updates anymore.
openSUSE Leap 15.4 release-notes-susemanager Released
openSUSE Leap 15.4 release-notes-susemanager-proxy Released
Products at an unknown state of their lifecycle.
Products spacewalk-java Already fixed
SUSE Manager Proxy 4.3 LTS release-notes-susemanager-proxy Released
SUSE Manager Retail Branch Server 4.3 LTS release-notes-susemanager-proxy Released
SUSE Manager Server 4.3 LTS release-notes-susemanager Released
Container Status
suse/manager/4.3/proxy-httpd release-notes-susemanager-proxyReleased
suse/manager/5.0/x86_64/server spacewalk-javaAlready fixed


SUSE Timeline for this CVE

CVE page created: Mon Jul 14 11:45:21 2025
CVE page last modified: Sat Nov 1 17:10:11 2025