{
  "affected": [
    {
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "2b05d9df4e343b7ede5d9210c859a9a07e5f6f7e"
            }
          ],
          "repo": "https://github.com/ldapaccountmanager/lam",
          "type": "GIT"
        }
      ]
    }
  ],
  "aliases": [
    "GHSA-6gqg-wm9x-5x3m"
  ],
  "database_specific": {
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
      "CWE-79"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/58xxx/CVE-2025-58174.json"
  },
  "details": "LDAP Account Manager (LAM) is a webfrontend for managing entries stored in an LDAP directory. LAM before 9.3 allows stored cross-site scripting in the Profile section via the profile name field, which renders untrusted input as HTML and executes a supplied script (for example a script element). An authenticated user with permission to create or edit a profile can insert a script payload into the profile name and have it executed when the profile data is viewed in a browser. This issue is fixed in version 9.3. No known workarounds are mentioned.",
  "id": "CVE-2025-58174",
  "modified": "2025-12-04T02:34:01.691261546Z",
  "published": "2025-09-16T16:29:37.615Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/58xxx/CVE-2025-58174.json"
    },
    {
      "type": "ADVISORY",
      "url": "https://github.com/LDAPAccountManager/lam/security/advisories/GHSA-6gqg-wm9x-5x3m"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58174"
    }
  ],
  "schema_version": "1.7.3",
  "severity": [
    {
      "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
      "type": "CVSS_V3"
    }
  ],
  "summary": "LAM profile editor stored cross-site scripting vulnerability"
}