CVE-2025-64174 is a low severity vulnerability with a CVSS score of 0.0. No known exploits currently, and patches are available.
Very low probability of exploitation
EPSS predicts the probability of exploitation in the next 30 days based on real-world threat data, complementing CVSS severity scores with actual risk assessment.
OpenMage versions v20.15.0 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an admin with direct database access or the admin notification feed source to inject malicious scripts into vulnerable fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
Unescaped translation strings and URLs are printed into contexts inside app/code/core/Mage/Adminhtml/Block/Notification/Grid/Renderer/Actions.php. A malicious translation or polluted data can inject script.
"Read Details","<img src=x onerror=alert(123)>"
"Mark as Read","<script>alert(123)</script>"
<?php
require 'app/Mage.php';
Mage::app('admin');
Mage::getModel('adminnotification/inbox')->setData([
'severity' => Mage_AdminNotification_Model_Inbox::SEVERITY_NOTICE,
'date_added' => now(),
'title' => 'XSS renderer test',
'description' => 'Testing actions renderer',
'url' => 'https://example.com', // makes the "Read Details" link appear
'is_read' => 0, // makes the "Mark as Read" link appear
'is_remove' => 0,
])->save();
The vulnerability is only exploitable by an attacker with administrative or translation privileges. Malicious JavaScript may be executed in a victim’s browser when they browse to the admin page containing the vulnerable fields.
Please cite this page when referencing data from Strobes VI. Proper attribution helps support our vulnerability intelligence research.