Unrated severityNVD Advisory· Published Nov 4, 2025· Updated Nov 5, 2025
Xibo CMS: Remote Code Execution through module templates
CVE-2025-62369
Description
Xibo is an open source digital signage platform with a web content management system (CMS). Versions 4.3.0 and below contain a Remote Code Execution vulnerability in the CMS Developer menu's Module Templating functionality, allowing authenticated users with "System -> Add/Edit custom modules and templates" permissions to manipulate Twig filters and execute arbitrary server-side functions as the web server user. This issue is fixed in version 4.3.1. To workaround this issue, use the 4.1 and 4.2 patch commits.
Affected products
2- Range: <=4.3.0
- xibosignage/xibo-cmsv5Range: < 4.3.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/xibosignage/xibo-cms/commit/0f4e88396111ea027785a48dd8f5eeb14536bd71mitrex_refsource_MISC
- github.com/xibosignage/xibo-cms/commit/ecd4f9d2cea739a46756a108a839cac80f65cf10mitrex_refsource_MISC
- github.com/xibosignage/xibo-cms/releases/tag/4.3.1mitrex_refsource_MISC
- github.com/xibosignage/xibo-cms/security/advisories/GHSA-7rmm-689c-gjgvmitrex_refsource_CONFIRM
- patch-diff.githubusercontent.com/raw/xibosignage/xibo-cms/pull/3128.patchmitrex_refsource_MISC
News mentions
0No linked articles in our index yet.