No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 24 Mar 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Cross‑Site Scripting via Comment Field in NetBox 4.3.5 |
Fri, 20 Mar 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:netbox:netbox:4.3.5:*:*:*:*:*:*:* |
Tue, 17 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Netbox
Netbox netbox |
|
| Vendors & Products |
Netbox
Netbox netbox |
Mon, 16 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-79 | |
| Metrics |
cvssV3_1
|
Mon, 16 Mar 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Cross Site scripting vulnerability (XSS) in NetBox 4.3.5 "comment" field on object forms. An attacker can inject arbitrary HTML, which will be rendered in the web UI when viewed by other users. This could potentially lead to user interface redress attacks or be escalated to XSS in certain contexts. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-03-16T19:10:44.673Z
Reserved: 2025-08-17T00:00:00.000Z
Link: CVE-2025-57543
Updated: 2026-03-16T19:10:37.239Z
Status : Analyzed
Published: 2026-03-16T16:16:13.030
Modified: 2026-03-20T13:56:20.397
Link: CVE-2025-57543
No data.
OpenCVE Enrichment
Updated: 2026-03-23T14:01:04Z