CVE-2025-9158

NameCVE-2025-9158
DescriptionThe Request Tracker software is vulnerable to a Stored XSS vulnerability in calendar invitation parsing feature, which displays invitation data without HTML sanitization. XSS vulnerability allows an attacker to send a specifically crafted e-mail enabling JavaScript code execution by displaying the ticket in the context of the logged-in user. This vulnerability affects versions from 5.0.4 through 5.0.8 and from 6.0.0 through 6.0.1.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
request-tracker5 (PTS)bookworm5.0.3+dfsg-3~deb12u3fixed
bookworm (security)5.0.3+dfsg-3~deb12u4fixed
trixie (security)5.0.7+dfsg-4+deb13u1fixed
forky, trixie5.0.7+dfsg-4vulnerable
sid5.0.7+dfsg-5fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
request-tracker5sourcebookworm(not affected)
request-tracker5sourcetrixie5.0.7+dfsg-4+deb13u1
request-tracker5source(unstable)5.0.7+dfsg-5

Notes

[bookworm] - request-tracker5 <not-affected> (Vulnerable code introduced later)
Fixed by: https://github.com/bestpractical/rt/commit/04b5694e6cd150492aa51b8edaba75f5997ea40c (rt-5.0.9)

Search for package or bug name: Reporting problems