VYPR
Medium severity4.3NVD Advisory· Published Jul 20, 2025· Updated Apr 29, 2026

CVE-2025-7885

CVE-2025-7885

Description

A vulnerability, which was classified as problematic, has been found in Huashengdun WebSSH up to 1.6.2. Affected by this issue is some unknown functionality of the component Login Page. The manipulation of the argument hostname/port leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
websshPyPI
< 1.6.31.6.3

Affected products

1

Patches

1
a7a704f11139

Output status in text

https://github.com/huashengdun/websshShengJul 27, 2025via ghsa
2 files changed · +2 2
  • webssh/static/js/main.js+1 1 modified
    @@ -325,7 +325,7 @@ jQuery(function($){
     
       function log_status(text, to_populate) {
         console.log(text);
    -    status.html(text.split('\n').join('<br/>'));
    +    status.text(text);
     
         if (to_populate && validated_form_data) {
           populate_form(validated_form_data);
    
  • webssh/templates/index.html+1 1 modified
    @@ -87,7 +87,7 @@
         </div>
     
         <div class="container">
    -      <div id="status" style="color: red;"></div>
    +      <div id="status" style="color: red; white-space: pre-line;"></div>
           <div id="terminal"></div>
         </div>
     
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.