Medium severity4.3NVD Advisory· Published Jul 20, 2025· Updated Apr 29, 2026
CVE-2025-7885
CVE-2025-7885
Description
A vulnerability, which was classified as problematic, has been found in Huashengdun WebSSH up to 1.6.2. Affected by this issue is some unknown functionality of the component Login Page. The manipulation of the argument hostname/port leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
websshPyPI | < 1.6.3 | 1.6.3 |
Affected products
1Patches
12 files changed · +2 −2
webssh/static/js/main.js+1 −1 modified@@ -325,7 +325,7 @@ jQuery(function($){ function log_status(text, to_populate) { console.log(text); - status.html(text.split('\n').join('<br/>')); + status.text(text); if (to_populate && validated_form_data) { populate_form(validated_form_data);
webssh/templates/index.html+1 −1 modified@@ -87,7 +87,7 @@ </div> <div class="container"> - <div id="status" style="color: red;"></div> + <div id="status" style="color: red; white-space: pre-line;"></div> <div id="terminal"></div> </div>
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
8- github.com/huashengdun/webssh/issues/410nvdIssue TrackingPatchWEB
- github.com/4m3rr0r/PoCVulDb/blob/main/CVE-2025-7885.mdnvdExploitThird Party AdvisoryWEB
- github.com/advisories/GHSA-9cg4-9hv5-3376ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-7885ghsaADVISORY
- vuldb.comnvdThird Party AdvisoryVDB EntryWEB
- vuldb.comnvdThird Party AdvisoryVDB EntryWEB
- github.com/huashengdun/webssh/commit/a7a704f111391c82efc1bacf89693ff45bda7f5fghsaWEB
- vuldb.comnvdPermissions RequiredVDB EntryWEB
News mentions
0No linked articles in our index yet.