Security advisory: IBEXA-SA-2025-004

XSS and enumeration vulnerabilities in back office
Publication date:
17/10/2025, 11:00

Severity:
High

Affected versions: Ibexa DXP v3.3.*, Ibexa DXP v4.6.*, Ibexa DXP v5.0.* (several repositories, please see the description)
Resolving versions: Ibexa DXP v3.3.44, Ibexa DXP v4.6.25, Ibexa DXP v5.0.3 (several repositories, please see the description)

This security advisory resolves XSS vulnerabilities in several parts of the back office of the DXP. Back office access and varying levels of editing and management permissions are required to exploit these vulnerabilities. This typically means Editor or Administrator role, or similar. Injected XSS is persistent and may in some cases be reflected in the front office, possibly affecting end users. The fixes ensure XSS is escaped, and any existing injected XSS is rendered harmless.

These are the affected areas of the back office:

  • Product assets
  • Image asset field type
  • Content tags
  • Acronym custom tag in Rich Text
  • Content languages
  • Future publishing

The advisory also resolves an enumeration issue in v5 only, where error messages could provide enough information to tell whether a user exists or not. This is resolved by ensuring the error messages are sufficiently ambigious.


Have you found a security bug in Ibexa DXP? See how to report it responsibly here: https://doc.ibexa.co/en/latest/infrastructure_and_maintenance/security/reporting_issues/

All security advisories