<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://en.wiki.bluespice.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Rvogel1</id>
	<title>BlueSpice - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://en.wiki.bluespice.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Rvogel1"/>
	<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/wiki/Special:Contributions/Rvogel1"/>
	<updated>2026-04-09T10:04:31Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.6</generator>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Development&amp;diff=13919</id>
		<title>Development</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Development&amp;diff=13919"/>
		<updated>2026-03-17T07:03:30Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page contains information about how to set up a local development environment for BlueSpice.&lt;br /&gt;
&lt;br /&gt;
== Local development environment based on &amp;lt;code&amp;gt;bluespice-deploy&amp;lt;/code&amp;gt; ==&lt;br /&gt;
A developer can use the [[Setup:Installation Guide/Docker|default deployment stack]] and alter is to quickly set up a development environment. To do so, first clone the stack to your local machine and navigate into it:&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;text&amp;quot;&amp;gt;&lt;br /&gt;
git clone -b 5.2.x git@github.com:hallowelt/bluespice-deploy.git&lt;br /&gt;
cd bluespice-deploy/compose&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Create a proper &amp;lt;code&amp;gt;.env&amp;lt;/code&amp;gt; file from the &amp;lt;code&amp;gt;.env.sample&amp;lt;/code&amp;gt; and alter/add the following lines:  &lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;text&amp;quot;&amp;gt;&lt;br /&gt;
DATADIR=~/workspace/REL1_43-5.2.x/data&lt;br /&gt;
CODEDIR=~/workspace/REL1_43-5.2.x/code&lt;br /&gt;
SMTP_HOST=mailhog&lt;br /&gt;
SMTP_PORT=1025&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Create a &amp;lt;code&amp;gt;docker-compose.overrides.yml&amp;lt;/code&amp;gt; file with the following content:&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;yaml&amp;quot;&amp;gt;&lt;br /&gt;
x-common-dev: &amp;amp;x-common&lt;br /&gt;
  image: docker.bluespice.com/bluespice-qa/wiki:latest&lt;br /&gt;
  volumes:&lt;br /&gt;
    - ${CODEDIR}:/app/bluespice/w/&lt;br /&gt;
&lt;br /&gt;
services:&lt;br /&gt;
&lt;br /&gt;
  wiki-installer:&lt;br /&gt;
    &amp;lt;&amp;lt;: *x-common&lt;br /&gt;
&lt;br /&gt;
  wiki-web:&lt;br /&gt;
    &amp;lt;&amp;lt;: *x-common&lt;br /&gt;
    restart: no&lt;br /&gt;
&lt;br /&gt;
  wiki-task:&lt;br /&gt;
    &amp;lt;&amp;lt;: *x-common&lt;br /&gt;
    restart: no&lt;br /&gt;
&lt;br /&gt;
  mailhog:&lt;br /&gt;
    image: mailhog/mailhog&lt;br /&gt;
    container_name: ${COMPOSE_PROJECT_NAME:-bluespice}-mailhog&lt;br /&gt;
    environment:&lt;br /&gt;
      VIRTUAL_HOST: ${WIKI_HOST}&lt;br /&gt;
      VIRTUAL_PATH: /_mailhog/&lt;br /&gt;
      VIRTUAL_PORT: 8025&lt;br /&gt;
      VIRTUAL_DEST: /&lt;br /&gt;
    restart: no&lt;br /&gt;
&lt;br /&gt;
  cache:&lt;br /&gt;
    restart: no&lt;br /&gt;
&lt;br /&gt;
  collabpads:&lt;br /&gt;
    restart: no&lt;br /&gt;
&lt;br /&gt;
  collabpads-database:&lt;br /&gt;
    restart: no&lt;br /&gt;
&lt;br /&gt;
  database:&lt;br /&gt;
    restart: no&lt;br /&gt;
&lt;br /&gt;
  diagram:&lt;br /&gt;
    restart: no&lt;br /&gt;
&lt;br /&gt;
  formula:&lt;br /&gt;
    restart: no&lt;br /&gt;
&lt;br /&gt;
  pdf:&lt;br /&gt;
    restart: no&lt;br /&gt;
&lt;br /&gt;
  proxy:&lt;br /&gt;
    restart: no&lt;br /&gt;
  &lt;br /&gt;
  search:&lt;br /&gt;
    restart: no&lt;br /&gt;
&lt;br /&gt;
  wire:&lt;br /&gt;
    restart: no&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This will make the stack use your local codebase from &amp;lt;code&amp;gt;$CODEDIR&amp;lt;/code&amp;gt; and also expose a Mailhog web interface on &amp;lt;code&amp;gt;$Wiki_HOST/_mailhog&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
​In addition, if you want to work with a custom build of the &amp;lt;code&amp;gt;bluespice/wiki&amp;lt;/code&amp;gt; container, you can add an &amp;lt;code&amp;gt;image:&amp;lt;/code&amp;gt; entry to the respective services. Example&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;yaml&amp;quot;&amp;gt;&lt;br /&gt;
  wiki-installer:&lt;br /&gt;
    image: bluespice/wiki:dev&lt;br /&gt;
...&lt;br /&gt;
  wiki-web:&lt;br /&gt;
    image: bluespice/wiki:dev&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
  wiki-task:&lt;br /&gt;
    image: bluespice/wiki:dev&lt;br /&gt;
...&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;or you set&amp;lt;blockquote&amp;gt;BLUESPICE_WIKI_IMAGE=bluespice/wiki:dev&amp;lt;/blockquote&amp;gt;in your &amp;lt;code&amp;gt;.env&amp;lt;/code&amp;gt;-File&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories&amp;diff=13861</id>
		<title>Security:Security Advisories</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories&amp;diff=13861"/>
		<updated>2026-03-04T15:36:17Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;width:100%;&amp;quot;&lt;br /&gt;
! style=&amp;quot;&amp;quot; |Release name&lt;br /&gt;
! style=&amp;quot;&amp;quot; |Release date&lt;br /&gt;
! style=&amp;quot;&amp;quot; |Title&lt;br /&gt;
! style=&amp;quot;&amp;quot; |References&lt;br /&gt;
! style=&amp;quot;&amp;quot; |Summary&lt;br /&gt;
!Severity&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2026-02|BSSA-2026-02]]&lt;br /&gt;
|2026-03-04&lt;br /&gt;
|Security vulnerability in BlueSpice Database container and NSFileRepo extension.&lt;br /&gt;
|[https://avd.aquasec.com/nvd/2025/cve-2025-15467 CVE-2025-15467],&lt;br /&gt;
[https://avd.aquasec.com/nvd/2026/cve-2026-24732 CVE-2026-24732]&lt;br /&gt;
|Buffer Overflow; Information disclosure&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |Low&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2026-01|BSSA-2026-01]]&lt;br /&gt;
|2026-01-28&lt;br /&gt;
|Security vulnerability in BlueSpice Collabpads database container.&lt;br /&gt;
|[https://avd.aquasec.com/nvd/2025/cve-2025-14847 CVE-2025-14847]&lt;br /&gt;
|Read of uninitialized heap memory&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |Low&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2025-07|BSSA-2025-07]]&lt;br /&gt;
|2025-12-10&lt;br /&gt;
|Security vulnerability in BlueSpice Search container.&lt;br /&gt;
|[https://avd.aquasec.com/nvd/2025/cve-2025-66516 CVE-2025-66516]&lt;br /&gt;
|XML Entity Injection&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |Low&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2025-06|BSSA-2025-06]]&lt;br /&gt;
|2025-10-28&lt;br /&gt;
|Security vulnerabilities in various MediaWiki extensions that are actually part of the BlueSpice distribution&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2024-56171 CVE-2024-56171], [https://www.cve.org/CVERecord?id=CVE-2025-3277 CVE-2025-3277], [https://www.cve.org/CVERecord?id=CVE-2025-6965 CVE-2025-6965], [https://www.cve.org/CVERecord?id=CVE-2025-11173 CVE-2025-11173], [https://www.cve.org/CVERecord?id=CVE-2025-11175 CVE-2025-11175],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-53625 CVE-2025-53625],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-54370 CVE-2025-54370],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-54874 CVE-2025-54874],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-59839 CVE-2025-59839],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61634 CVE-2025-61634],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61635 CVE-2025-61635],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61636 CVE-2025-61636],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61637 CVE-2025-61637],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61638 CVE-2025-61638],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61639 CVE-2025-61639],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61640 CVE-2025-61640],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61641 CVE-2025-61641],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61642 CVE-2025-61642],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61643 CVE-2025-61643],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61646 CVE-2025-61646],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61652 CVE-2025-61652],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61653 CVE-2025-61653],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61655 CVE-2025-61655],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61655 CVE-2025-61655],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61656 CVE-2025-61656],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61656 CVE-2025-61656],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61657 CVE-2025-61657],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-7458 CVE-2025-7458]&lt;br /&gt;
|Denial Of Service,&lt;br /&gt;
Cross-Site Scripting (XSS),&lt;br /&gt;
Information Disclosure,&lt;br /&gt;
Bypass authn at content check,&lt;br /&gt;
Server-side Request Forgery,&lt;br /&gt;
Arbitrary Code Execution,&lt;br /&gt;
Memory Corruption,&lt;br /&gt;
Use-After-Free,&lt;br /&gt;
Arbitrary SQL Execution&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-red-bg&amp;quot; |High&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2025-05|BSSA-2025-05]]&lt;br /&gt;
|2025-09-19&lt;br /&gt;
|XSS in Extension:AtMentions, Extension:BlueSpiceAvatars, Extension:BlueSpiceWhoIsOnline and Extension:CognitiveProcessDesigner&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2025-46703 CVE-2025-46703], [https://www.cve.org/CVERecord?id=CVE-2025-48007 CVE-2025-48007], [https://www.cve.org/CVERecord?id=CVE-2025-57880 CVE-2025-57880], [https://www.cve.org/CVERecord?id=CVE-2025-58114 CVE-2025-58114]&lt;br /&gt;
|&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-orange-bg&amp;quot; |Medium&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2025-04|BSSA-2025-04]]&lt;br /&gt;
|2025-09-18&lt;br /&gt;
|Security vulnerabilities in services &amp;lt;code&amp;gt;bluespice/search&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;bluespice/formular&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;bluespice/wiki&amp;lt;/code&amp;gt; &lt;br /&gt;
|[https://nvd.nist.gov/vuln/detail/CVE-2025-54988 CVE-2025-54988], [https://avd.aquasec.com/nvd/2025/cve-2025-7783 CVE-2025-7783], [https://avd.aquasec.com/nvd/cve-2025-58050 CVE-2025-58050], [https://avd.aquasec.com/nvd/cve-2025-49794 CVE-2025-49794], [https://avd.aquasec.com/nvd/cve-2025-49796 CVE-2025-49796]&lt;br /&gt;
|Denial-of-Service, Information Disclosure&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |Low&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2025-03|BSSA-2025-03]]&lt;br /&gt;
|2025-07-28&lt;br /&gt;
|Security vulnerabilities in Extension:Scribunto, Extension:TabberNeue, Extension:TwoColConflict and Extension:Quiz&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2025-53501 CVE-2025-53501], [https://www.cve.org/CVERecord?id=CVE-2025-53494 CVE-2025-53494], [https://www.cve.org/CVERecord?id=CVE-2025-53093 CVE-2025-53093], [https://www.cve.org/CVERecord?id=CVE-2025-7057 CVE-2025-7057]&lt;br /&gt;
|Information Disclosure, &lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-orange-bg&amp;quot; |Medium&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2025-02|BSSA-2025-02]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2025-04-17&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Security vulnerabilities in Extension:OAuth&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2025-32068 CVE-2025-32068], [https://www.cve.org/CVERecord?id=CVE-2025-32074 CVE-2025-32074]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Allows unauthorized access to the wiki, Cross-Site Scripting (XSS)&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-orange-bg&amp;quot; |Medium&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2025-01|BSSA-2025-01]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2025-01-20&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Security vulnerabilities in Extension:DataTransfer &lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2025-23081 CVE-2025-23081]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Allows Cross Site Request Forgery, Cross-Site Scripting (XSS)&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-orange-bg&amp;quot; |Medium&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2023-02|BSSA-2023-02]]&lt;br /&gt;
|2023-10-30&lt;br /&gt;
|Security vulnerabilities in Extension:BlueSpiceAvatars&lt;br /&gt;
|[https://www.cve.org/cverecord?id=CVE-2023-42431 CVE-2023-42431]&lt;br /&gt;
|Allows Cross-Site Scripting (XSS)&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |Low&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2023-01|BSSA-2023-01]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2023-07-25&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Ghostscript vulnerability&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2023-36664 CVE-2023-36664]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Code can be executed on the server via a manipulated PDF&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-orange-bg&amp;quot; |Medium&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-08|BSSA-2022-08]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-3895 CVE-2022-3895]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through use of interface elements&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-orange-bg&amp;quot; |Medium&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-07|BSSA-2022-07]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-3958 CVE-2022-3958]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through personal menu items&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-orange-bg&amp;quot; |Medium&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-06|BSSA-2022-06]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-3893 CVE-2022-3893]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through the custom menu&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |Low&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-05|BSSA-2022-05]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-42001 CVE-2022-42001]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through the book navigation&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |Low&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-04|BSSA-2022-04]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-41789 CVE-2022-41789], [https://www.cve.org/CVERecord?id=CVE-2022-41814 CVE-2022-41814], [https://www.cve.org/CVERecord?id=CVE-2022-42000 CVE-2022-42000]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through user preferences&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |Low&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-03|BSSA-2022-03]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-41611 CVE-2022-41611]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through main navigation&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |Low&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-02|BSSA-2022-02]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-2511 CVE-2022-2511]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through the &#039;title&#039; parameter&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-orange-bg&amp;quot; |Medium&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-01|BSSA-2022-01]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-01-31&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector in Search Center&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-2510 CVE-2022-2510]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |JavaScript in search field is reflected back to the browser.&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-orange-bg&amp;quot; |Medium&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2026-02&amp;diff=13860</id>
		<title>Security:Security Advisories/BSSA-2026-02</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2026-02&amp;diff=13860"/>
		<updated>2026-03-04T15:32:37Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2026-03-04&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|reported &amp;quot;high&amp;quot;, BlueSpice assessment: &#039;&#039;&#039;low&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
| Services in LTS version &amp;lt; 5.1.5&lt;br /&gt;
BlueSpice PRO/FARM &amp;lt; 5.1.4&lt;br /&gt;
&lt;br /&gt;
BlueSpice PRO/FARM &amp;lt; 5.2.0&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|BlueSpice PRO/FARM 5.1.4&lt;br /&gt;
BlueSpice PRO/FARM 5.2.1&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|&lt;br /&gt;
* [https://avd.aquasec.com/nvd/2025/cve-2025-15467/ CVE-2025-15467]&lt;br /&gt;
* [https://avd.aquasec.com/nvd/2026/cve-2026-24732 CVE-2026-24732]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Problem==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!&#039;&#039;&#039;CVE&#039;&#039;&#039;&lt;br /&gt;
!&#039;&#039;&#039;Component&#039;&#039;&#039;&lt;br /&gt;
!&#039;&#039;&#039;Type of vulnerability&#039;&#039;&#039;&lt;br /&gt;
!&#039;&#039;&#039;BlueSpice 5&#039;&#039;&#039;&lt;br /&gt;
!&#039;&#039;&#039;BlueSpice 4&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-15467&lt;br /&gt;
|Container &amp;lt;code&amp;gt;bluespice/database&amp;lt;/code&amp;gt;&lt;br /&gt;
|Buffer Overflow&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-purple-bg&amp;quot; |affected&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-purple-bg&amp;quot; |affected&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2026-24732&lt;br /&gt;
|Extension:NSFileRepo&lt;br /&gt;
|Information Disclosure&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-purple-bg&amp;quot; |affected&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |not affected&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Impact assessment==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
!CVE&lt;br /&gt;
!Assessment&lt;br /&gt;
!Mitigation without update&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;vertical-align:middle;text-align:left;&amp;quot; |CVE-2025-15467&lt;br /&gt;
| style=&amp;quot;vertical-align:middle;text-align:left;&amp;quot; class=&amp;quot;col-orange-bg&amp;quot; |Low, as by default configuration of &amp;lt;code&amp;gt;bluespice-deploy&amp;lt;/code&amp;gt;, this is not exploitable&lt;br /&gt;
| style=&amp;quot;vertical-align:middle;text-align:left;&amp;quot; |Make sure the service has no access to the internet. This is the default configuration of BlueSpice setups&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2026-24732&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-orange-bg&amp;quot; |Low, as by default configuration of BlueSpice MediaWiki, this is not exploitable. The affected type of configuration is considered an edge-case.&lt;br /&gt;
|Make sure &amp;lt;code&amp;gt;$wgGroupPermissions[&#039;*&#039;][&#039;read&#039;]&amp;lt;/code&amp;gt; is set to &amp;lt;code&amp;gt;false&amp;lt;/code&amp;gt; in the  &amp;lt;code&amp;gt;LocalSettings.php&amp;lt;/code&amp;gt;.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
Update to BlueSpice 5.1.4+ or 5.2.1+&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2026-02&amp;diff=13859</id>
		<title>Security:Security Advisories/BSSA-2026-02</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2026-02&amp;diff=13859"/>
		<updated>2026-03-04T13:01:32Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2026-03-04&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|reported &amp;quot;high&amp;quot;, BlueSpice assessment: &#039;&#039;&#039;low&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
| Services in LTS version &amp;lt; 5.1.5&lt;br /&gt;
BlueSpice PRO/FARM &amp;lt; 5.1.5&lt;br /&gt;
BlueSpice PRO/FARM &amp;lt; 5.2.0&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|BlueSpice PRO/FARM 5.1.4&lt;br /&gt;
BlueSpice PRO/FARM 5.2.1&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|&lt;br /&gt;
* [https://avd.aquasec.com/nvd/2025/cve-2025-15467/ CVE-2025-15467]&lt;br /&gt;
* [https://avd.aquasec.com/nvd/2026/cve-2026-24732 CVE-2026-24732]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Problem==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!&#039;&#039;&#039;CVE&#039;&#039;&#039;&lt;br /&gt;
!&#039;&#039;&#039;Component&#039;&#039;&#039;&lt;br /&gt;
!&#039;&#039;&#039;Type of vulnerability&#039;&#039;&#039;&lt;br /&gt;
!&#039;&#039;&#039;BlueSpice 5&#039;&#039;&#039;&lt;br /&gt;
!&#039;&#039;&#039;BlueSpice 4&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-15467&lt;br /&gt;
|Container &amp;lt;code&amp;gt;bluespice/database&amp;lt;/code&amp;gt;&lt;br /&gt;
|Buffer Overflow&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-purple-bg&amp;quot; |affected&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-purple-bg&amp;quot; |affected&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2026-24732&lt;br /&gt;
|&lt;br /&gt;
|Information Disclosure&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-purple-bg&amp;quot; |affected&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |not affected&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Impact assessment==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
!CVE&lt;br /&gt;
!Assessment&lt;br /&gt;
!Mitigation without update&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;vertical-align:middle;text-align:left;&amp;quot; |CVE-2025-15467&lt;br /&gt;
| style=&amp;quot;vertical-align:middle;text-align:left;&amp;quot; class=&amp;quot;col-orange-bg&amp;quot; |Low&lt;br /&gt;
| style=&amp;quot;vertical-align:middle;text-align:left;&amp;quot; |Make sure the service has no access to the internet. This is the default configuration of BlueSpice setups&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2026-24732&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-purple-bg&amp;quot; |Medium&lt;br /&gt;
|None&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
To mitigate &amp;lt;code&amp;gt;CVE-2026-24732&amp;lt;/code&amp;gt; , please update to&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2026-02&amp;diff=13858</id>
		<title>Security:Security Advisories/BSSA-2026-02</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2026-02&amp;diff=13858"/>
		<updated>2026-03-04T13:00:54Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2026-01-29&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|reported &amp;quot;high&amp;quot;, BlueSpice assessment: &#039;&#039;&#039;low&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
| Services in LTS version &amp;lt; 5.1.5&lt;br /&gt;
BlueSpice PRO/FARM &amp;lt; 5.1.5&lt;br /&gt;
BlueSpice PRO/FARM &amp;lt; 5.2.0&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|BlueSpice PRO/FARM 5.1.4&lt;br /&gt;
BlueSpice PRO/FARM 5.2.1&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|&lt;br /&gt;
* [https://avd.aquasec.com/nvd/2025/cve-2025-15467/ CVE-2025-15467]&lt;br /&gt;
* [https://avd.aquasec.com/nvd/2026/cve-2026-24732 CVE-2026-24732]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Problem==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!&#039;&#039;&#039;CVE&#039;&#039;&#039;&lt;br /&gt;
!&#039;&#039;&#039;Component&#039;&#039;&#039;&lt;br /&gt;
!&#039;&#039;&#039;Type of vulnerability&#039;&#039;&#039;&lt;br /&gt;
!&#039;&#039;&#039;BlueSpice 5&#039;&#039;&#039;&lt;br /&gt;
!&#039;&#039;&#039;BlueSpice 4&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-15467&lt;br /&gt;
|Container &amp;lt;code&amp;gt;bluespice/database&amp;lt;/code&amp;gt;&lt;br /&gt;
|Buffer Overflow&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-purple-bg&amp;quot; |affected&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-purple-bg&amp;quot; |affected&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2026-24732&lt;br /&gt;
|&lt;br /&gt;
|Information Disclosure&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-purple-bg&amp;quot; |affected&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |not affected&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Impact assessment==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
!CVE&lt;br /&gt;
!Assessment&lt;br /&gt;
!Mitigation without update&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;vertical-align:middle;text-align:left;&amp;quot; |CVE-2025-15467&lt;br /&gt;
| style=&amp;quot;vertical-align:middle;text-align:left;&amp;quot; class=&amp;quot;col-orange-bg&amp;quot; |Low&lt;br /&gt;
| style=&amp;quot;vertical-align:middle;text-align:left;&amp;quot; |Make sure the service has no access to the internet. This is the default configuration of BlueSpice setups&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2026-24732&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-purple-bg&amp;quot; |Medium&lt;br /&gt;
|None&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
To mitigate &amp;lt;code&amp;gt;CVE-2026-24732&amp;lt;/code&amp;gt; , please update to&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2026-01&amp;diff=13857</id>
		<title>Security:Security Advisories/BSSA-2026-01</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2026-01&amp;diff=13857"/>
		<updated>2026-03-04T12:52:08Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: Undo previous change; Will go into dedicated BSSA&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2026-01-29&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|reported &amp;quot;high&amp;quot;, BlueSpice assessment: &#039;&#039;&#039;low&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
| Services in current LTS version &amp;lt; 5.1.4&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|5.2.1, 5.1.5&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
| [https://avd.aquasec.com/nvd/2025/cve-2025-14847 CVE-2025-14847]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Problem==&lt;br /&gt;
* Service &amp;lt;code&amp;gt;collabpads-database&amp;lt;/code&amp;gt; (image name: &amp;lt;code&amp;gt;mongo&amp;lt;/code&amp;gt; ) - [https://avd.aquasec.com/nvd/2025/cve-2025-14847 CVE-2025-14847]&lt;br /&gt;
&lt;br /&gt;
==Impact assessment==&lt;br /&gt;
* Service &amp;lt;code&amp;gt;collabpads-database&amp;lt;/code&amp;gt; (image name: &amp;lt;code&amp;gt;mongo&amp;lt;/code&amp;gt; ) &lt;br /&gt;
** A unauthenticated MongoDB client can attack the service if reachable.  By default BlueSpice setup, the service runs only in the background and can not be accessed from outside the virtual network. So not even unauthenticated access is possible from any external location.&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
To mitigate &amp;lt;code&amp;gt;CVE-2025-14847&amp;lt;/code&amp;gt;  use one of the following options:&lt;br /&gt;
&lt;br /&gt;
# Make sure the service has no access to the internet. This is the default configuration of BlueSpice setups.&lt;br /&gt;
# Update the &amp;lt;code&amp;gt;mongo&amp;lt;/code&amp;gt; docker image via BlueSpice&#039;s deploy tool: &amp;lt;code&amp;gt;bluespice-deploy pull collabpads-database &amp;amp;&amp;amp; bluespice-deploy up -d&amp;lt;/code&amp;gt; &lt;br /&gt;
# Update to version &amp;gt;=5.1.5 or &amp;gt;=5.2.1  of the BlueSpice images&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2026-02&amp;diff=13855</id>
		<title>Security:Security Advisories/BSSA-2026-02</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2026-02&amp;diff=13855"/>
		<updated>2026-03-04T12:20:41Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: Created page with &amp;quot;{| class=&amp;quot;wikitable&amp;quot; |+ ! ! |- |Date |2026-01-29 |- |Severity |reported &amp;quot;high&amp;quot;, BlueSpice assessment: &amp;#039;&amp;#039;&amp;#039;low&amp;#039;&amp;#039;&amp;#039; |- |Affected | Services in current LTS version &amp;lt; 5.1.4 |- |Fixed in | |- |CVE | * [https://avd.aquasec.com/nvd/2025/cve-2025-14847 CVE-2025-14847] * [https://avd.aquasec.com/nvd/2025/cve-2025-15467/ CVE-2025-15467] |}  ==Problem== {| class=&amp;quot;wikitable&amp;quot; !&amp;#039;&amp;#039;&amp;#039;CVE&amp;#039;&amp;#039;&amp;#039; !&amp;#039;&amp;#039;&amp;#039;Component&amp;#039;&amp;#039;&amp;#039; !&amp;#039;&amp;#039;&amp;#039;Type of vulnerability&amp;#039;&amp;#039;&amp;#039; !&amp;#039;&amp;#039;&amp;#039;BlueSpice 5&amp;#039;&amp;#039;&amp;#039; !&amp;#039;&amp;#039;&amp;#039;BlueSpice 4&amp;#039;&amp;#039;&amp;#039; |- |CVE-2025-148...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2026-01-29&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|reported &amp;quot;high&amp;quot;, BlueSpice assessment: &#039;&#039;&#039;low&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
| Services in current LTS version &amp;lt; 5.1.4&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|&lt;br /&gt;
* [https://avd.aquasec.com/nvd/2025/cve-2025-14847 CVE-2025-14847]&lt;br /&gt;
* [https://avd.aquasec.com/nvd/2025/cve-2025-15467/ CVE-2025-15467]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Problem==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!&#039;&#039;&#039;CVE&#039;&#039;&#039;&lt;br /&gt;
!&#039;&#039;&#039;Component&#039;&#039;&#039;&lt;br /&gt;
!&#039;&#039;&#039;Type of vulnerability&#039;&#039;&#039;&lt;br /&gt;
!&#039;&#039;&#039;BlueSpice 5&#039;&#039;&#039;&lt;br /&gt;
!&#039;&#039;&#039;BlueSpice 4&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-14847&lt;br /&gt;
|&amp;lt;code&amp;gt;container collabpads-database(image:mongo:8.0)&amp;lt;/code&amp;gt;&lt;br /&gt;
|Information Disclosure&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-purple-bg&amp;quot; |affected&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-purple-bg&amp;quot; |affected&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-15467&lt;br /&gt;
|Container &amp;lt;code&amp;gt;bluespice/database&amp;lt;/code&amp;gt;&lt;br /&gt;
|Buffer Overflow&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-purple-bg&amp;quot; |affected&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-purple-bg&amp;quot; |affected&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Impact assessment==&lt;br /&gt;
* Service &amp;lt;code&amp;gt;collabpads-database&amp;lt;/code&amp;gt; (image name: &amp;lt;code&amp;gt;mongo&amp;lt;/code&amp;gt; ) &lt;br /&gt;
** A unauthenticated MongoDB client can attack the service if reachable.  By default BlueSpice setup, the service runs only in the background and can not be accessed from outside the virtual network. So not even unauthenticated access is possible from any external location.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
!CVE&lt;br /&gt;
!Assessment&lt;br /&gt;
!Mitigation without update&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;vertical-align:middle;text-align:left;&amp;quot; |CVE-2025-14847&lt;br /&gt;
| style=&amp;quot;vertical-align:middle;text-align:left;&amp;quot; class=&amp;quot;col-orange-bg&amp;quot; |Low&lt;br /&gt;
| style=&amp;quot;vertical-align:middle;text-align:left;&amp;quot; |Make sure the service has no access to the internet. This is the default configuration of BlueSpice setups&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-15467&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-orange-bg&amp;quot; |Low&lt;br /&gt;
|Make sure the service has no access to the internet. This is the default configuration of BlueSpice setups&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
To mitigate &amp;lt;code&amp;gt;CVE-2025-14847&amp;lt;/code&amp;gt;  use one of the following options:&lt;br /&gt;
&lt;br /&gt;
# Make sure the service has no access to the internet. This is the default configuration of BlueSpice setups.&lt;br /&gt;
# Update the &amp;lt;code&amp;gt;mongo&amp;lt;/code&amp;gt; docker image via BlueSpice&#039;s deploy tool: &amp;lt;code&amp;gt;bluespice-deploy pull collabpads-database &amp;amp;&amp;amp; bluespice-deploy up -d&amp;lt;/code&amp;gt;&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Confluence_migration&amp;diff=13854</id>
		<title>Confluence migration</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Confluence_migration&amp;diff=13854"/>
		<updated>2026-02-27T09:59:22Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: /* Roadmap */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;Hallo Welt!&#039;&#039; has created a migration tool that can be used to import Confluence spaces into a MediaWiki or BlueSpice installation. This is a command line tool and you need access to your MediaWiki or BlueSpice server environment.&lt;br /&gt;
&lt;br /&gt;
==Migration tool==&lt;br /&gt;
The [https://github.com/hallowelt/migrate-confluence?tab=readme-ov-file#migrate-confluence-xml-export-to-mediawiki-import-data migration tool can be found on GitHub] and is [https://github.com/hallowelt/migrate-confluence?tab=readme-ov-file#migrate-confluence-xml-export-to-mediawiki-import-data documented there].&lt;br /&gt;
&lt;br /&gt;
==Extensions==&lt;br /&gt;
The output generated by the tool contains certain elements that require &#039;&#039;&#039;additional extensions&#039;&#039;&#039; to activate. These extensions are already included in a BlueSpice Pro installation:&lt;br /&gt;
&lt;br /&gt;
#[[mediawikiwiki:Extension:TemplateStyles|TemplateStyles]]&lt;br /&gt;
#[[mediawikiwiki:Extension:ParserFunctions|ParserFunctions]]&lt;br /&gt;
#[[mediawikiwiki:Extension:SimpleTasks|SimpleTasks]]&lt;br /&gt;
#[[mediawikiwiki:Extension:Semantic_MediaWiki|Semantic MediaWiki]]&lt;br /&gt;
#[[mediawikiwiki:Extension:Header_Tabs|HeaderTabs]]&lt;br /&gt;
#[[mediawikiwiki:Extension:SubPageList|SubPageList]]&lt;br /&gt;
&lt;br /&gt;
==Macro check==&lt;br /&gt;
On the BlueSpice website, you can use a [https://bluespice.com/confluence-migration-process/#confluence-migration-input-desktop macro check] to see which Confluence macros are not automatically converted. If an important macro is marked as unsupported, the content can most likely still be transferred.&lt;br /&gt;
[[File:Confluence macro check.png|alt=Textarea for adding a list of macros (with step-by-step instructions)|center|thumb|650x650px|Macro check]]&lt;br /&gt;
&lt;br /&gt;
== Not migrated ==&lt;br /&gt;
The following Confluence elements are excluded from the migration:&lt;br /&gt;
&lt;br /&gt;
*User identities&lt;br /&gt;
*Comments&lt;br /&gt;
*Various macros&lt;br /&gt;
*Various layouts&lt;br /&gt;
*Blog posts&lt;br /&gt;
*Files in an area that cannot be assigned to a page&lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
* March &#039;26: Provide Docker Container (ERM46685) - Eases installation and allows for better automation&lt;br /&gt;
* March/April &#039;26: Allow for parallel processing (ERM45405) - Speeds up conversion of large Confluence exports&lt;br /&gt;
* March/April &#039;26: Migrate blogs posts to [[mw:Extension:SimpleBlogPage]] pages (ERM46628) - Additional content&lt;br /&gt;
* March/April &#039;26: Migrate page comments to [[mw:Extension:CommentStreams]] threads (ERM46627) - Additional content&lt;br /&gt;
* April &#039;26: Add support for historic page and file revisions (ERM35013) - Additional content&lt;br /&gt;
&lt;br /&gt;
==More information==&lt;br /&gt;
&lt;br /&gt;
*https://bluespice.com/migration-from-confluence-to-bluespice-mediawiki/&lt;br /&gt;
*https://bluespice.com/mediawiki-versus-confluence-not-a-question-of-features/&lt;br /&gt;
&lt;br /&gt;
[[de:Confluence Migration]]&lt;br /&gt;
[[Category:Setup]]&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Confluence_migration&amp;diff=13853</id>
		<title>Confluence migration</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Confluence_migration&amp;diff=13853"/>
		<updated>2026-02-27T09:57:46Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;Hallo Welt!&#039;&#039; has created a migration tool that can be used to import Confluence spaces into a MediaWiki or BlueSpice installation. This is a command line tool and you need access to your MediaWiki or BlueSpice server environment.&lt;br /&gt;
&lt;br /&gt;
==Migration tool==&lt;br /&gt;
The [https://github.com/hallowelt/migrate-confluence?tab=readme-ov-file#migrate-confluence-xml-export-to-mediawiki-import-data migration tool can be found on GitHub] and is [https://github.com/hallowelt/migrate-confluence?tab=readme-ov-file#migrate-confluence-xml-export-to-mediawiki-import-data documented there].&lt;br /&gt;
&lt;br /&gt;
==Extensions==&lt;br /&gt;
The output generated by the tool contains certain elements that require &#039;&#039;&#039;additional extensions&#039;&#039;&#039; to activate. These extensions are already included in a BlueSpice Pro installation:&lt;br /&gt;
&lt;br /&gt;
#[[mediawikiwiki:Extension:TemplateStyles|TemplateStyles]]&lt;br /&gt;
#[[mediawikiwiki:Extension:ParserFunctions|ParserFunctions]]&lt;br /&gt;
#[[mediawikiwiki:Extension:SimpleTasks|SimpleTasks]]&lt;br /&gt;
#[[mediawikiwiki:Extension:Semantic_MediaWiki|Semantic MediaWiki]]&lt;br /&gt;
#[[mediawikiwiki:Extension:Header_Tabs|HeaderTabs]]&lt;br /&gt;
#[[mediawikiwiki:Extension:SubPageList|SubPageList]]&lt;br /&gt;
&lt;br /&gt;
==Macro check==&lt;br /&gt;
On the BlueSpice website, you can use a [https://bluespice.com/confluence-migration-process/#confluence-migration-input-desktop macro check] to see which Confluence macros are not automatically converted. If an important macro is marked as unsupported, the content can most likely still be transferred.&lt;br /&gt;
[[File:Confluence macro check.png|alt=Textarea for adding a list of macros (with step-by-step instructions)|center|thumb|650x650px|Macro check]]&lt;br /&gt;
&lt;br /&gt;
== Not migrated ==&lt;br /&gt;
The following Confluence elements are excluded from the migration:&lt;br /&gt;
&lt;br /&gt;
*User identities&lt;br /&gt;
*Comments&lt;br /&gt;
*Various macros&lt;br /&gt;
*Various layouts&lt;br /&gt;
*Blog posts&lt;br /&gt;
*Files in an area that cannot be assigned to a page&lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
# Provide Docker Container (ERM46685) - Eases installation and allows for better automation&lt;br /&gt;
# Allow for parallel processing (ERM45405) - Speeds up conversion of large Confluence exports&lt;br /&gt;
# Migrate blogs posts to [[mw:Extension:SimpleBlogPage]] pages (ERM46628) - Additional content&lt;br /&gt;
# Migrate page comments to [[mw:Extension:CommentStreams]] threads (ERM46627) - Additional content&lt;br /&gt;
# Add support for historic page and file revisions (ERM35013) - Additional content&lt;br /&gt;
&lt;br /&gt;
==More information==&lt;br /&gt;
&lt;br /&gt;
*https://bluespice.com/migration-from-confluence-to-bluespice-mediawiki/&lt;br /&gt;
*https://bluespice.com/mediawiki-versus-confluence-not-a-question-of-features/&lt;br /&gt;
&lt;br /&gt;
[[de:Confluence Migration]]&lt;br /&gt;
[[Category:Setup]]&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Confluence_migration&amp;diff=13852</id>
		<title>Confluence migration</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Confluence_migration&amp;diff=13852"/>
		<updated>2026-02-27T09:54:22Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;Hallo Welt!&#039;&#039; has created a migration tool that can be used to import Confluence spaces into a MediaWiki or BlueSpice installation. This is a command line tool and you need access to your MediaWiki or BlueSpice server environment.&lt;br /&gt;
&lt;br /&gt;
==Migration tool==&lt;br /&gt;
The [https://github.com/hallowelt/migrate-confluence?tab=readme-ov-file#migrate-confluence-xml-export-to-mediawiki-import-data migration tool can be found on GitHub] and is [https://github.com/hallowelt/migrate-confluence?tab=readme-ov-file#migrate-confluence-xml-export-to-mediawiki-import-data documented there].&lt;br /&gt;
&lt;br /&gt;
==Extensions==&lt;br /&gt;
The output generated by the tool contains certain elements that require &#039;&#039;&#039;additional extensions&#039;&#039;&#039; to activate. These extensions are already included in a BlueSpice Pro installation:&lt;br /&gt;
&lt;br /&gt;
#[[mediawikiwiki:Extension:TemplateStyles|TemplateStyles]]&lt;br /&gt;
#[[mediawikiwiki:Extension:ParserFunctions|ParserFunctions]]&lt;br /&gt;
#[[mediawikiwiki:Extension:SimpleTasks|SimpleTasks]]&lt;br /&gt;
#[[mediawikiwiki:Extension:Semantic_MediaWiki|Semantic MediaWiki]]&lt;br /&gt;
#[[mediawikiwiki:Extension:Header_Tabs|HeaderTabs]]&lt;br /&gt;
#[[mediawikiwiki:Extension:SubPageList|SubPageList]]&lt;br /&gt;
&lt;br /&gt;
==Macro check==&lt;br /&gt;
On the BlueSpice website, you can use a [https://bluespice.com/confluence-migration-process/#confluence-migration-input-desktop macro check] to see which Confluence macros are not automatically converted. If an important macro is marked as unsupported, the content can most likely still be transferred.&lt;br /&gt;
[[File:Confluence macro check.png|alt=Textarea for adding a list of macros (with step-by-step instructions)|center|thumb|650x650px|Macro check]]&lt;br /&gt;
&lt;br /&gt;
== Not migrated ==&lt;br /&gt;
The following Confluence elements are excluded from the migration:&lt;br /&gt;
&lt;br /&gt;
*User identities&lt;br /&gt;
*Comments&lt;br /&gt;
*Various macros&lt;br /&gt;
*Various layouts&lt;br /&gt;
*Blog posts&lt;br /&gt;
*Files in an area that cannot be assigned to a page&lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
# Provide Docker Container - Eases installation and allows for better automation&lt;br /&gt;
# Allow for parallel processing (ERM45405) - Speeds up conversion of large Confluence exports&lt;br /&gt;
# Migrate blogs posts to [[mw:Extension:SimpleBlogPage]] pages (ERM46628) - Additional content&lt;br /&gt;
# Migrate page comments to [[mw:Extension:CommentStreams]] threads (ERM46627) - Additional content&lt;br /&gt;
# Add support for historic page and file revisions (ERM35013) - Additional content&lt;br /&gt;
&lt;br /&gt;
==More information==&lt;br /&gt;
&lt;br /&gt;
*https://bluespice.com/migration-from-confluence-to-bluespice-mediawiki/&lt;br /&gt;
*https://bluespice.com/mediawiki-versus-confluence-not-a-question-of-features/&lt;br /&gt;
&lt;br /&gt;
[[de:Confluence Migration]]&lt;br /&gt;
[[Category:Setup]]&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Development&amp;diff=13827</id>
		<title>Development</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Development&amp;diff=13827"/>
		<updated>2026-02-23T16:19:05Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: Created page with &amp;quot;This page contains information about how to set up a local development environment for BlueSpice.  == Local development environment based on &amp;lt;code&amp;gt;bluespice-deploy&amp;lt;/code&amp;gt; == A developer can use the default deployment stack and alter is to quickly set up a development environment. To do so, first clone the stack to your local machine and navigate into it: &amp;lt;syntaxhighlight lang=&amp;quot;text&amp;quot;&amp;gt; git clone -b 5.2.x git@github.com:hallowelt/bluespic...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page contains information about how to set up a local development environment for BlueSpice.&lt;br /&gt;
&lt;br /&gt;
== Local development environment based on &amp;lt;code&amp;gt;bluespice-deploy&amp;lt;/code&amp;gt; ==&lt;br /&gt;
A developer can use the [[Setup:Installation Guide/Docker|default deployment stack]] and alter is to quickly set up a development environment. To do so, first clone the stack to your local machine and navigate into it:&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;text&amp;quot;&amp;gt;&lt;br /&gt;
git clone -b 5.2.x git@github.com:hallowelt/bluespice-deploy.git&lt;br /&gt;
cd bluespice-deploy/compose&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Create a proper &amp;lt;code&amp;gt;.env&amp;lt;/code&amp;gt; file from the &amp;lt;code&amp;gt;.env.sample&amp;lt;/code&amp;gt; and alter/add the following lines:  &lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;text&amp;quot;&amp;gt;&lt;br /&gt;
DATADIR=~/workspace/REL1_43-5.2.x/data&lt;br /&gt;
CODEDIR=~/workspace/REL1_43-5.2.x/code&lt;br /&gt;
SMTP_HOST=mailhog&lt;br /&gt;
SMTP_PORT=1025&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Create a &amp;lt;code&amp;gt;docker-compose.overrides.yml&amp;lt;/code&amp;gt; file with the following content:&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;yaml&amp;quot;&amp;gt;&lt;br /&gt;
services:&lt;br /&gt;
&lt;br /&gt;
  wiki-installer:&lt;br /&gt;
    image: docker.bluespice.com/bluespice-qa/wiki:latest&lt;br /&gt;
    volumes:&lt;br /&gt;
      - ${CODEDIR}:/app/bluespice/w/&lt;br /&gt;
&lt;br /&gt;
  wiki-web:&lt;br /&gt;
    image: docker.bluespice.com/bluespice-qa/wiki:latest&lt;br /&gt;
    volumes:&lt;br /&gt;
      - ${CODEDIR}:/app/bluespice/w/&lt;br /&gt;
&lt;br /&gt;
  wiki-task:&lt;br /&gt;
    image: docker.bluespice.com/bluespice-qa/wiki:latest&lt;br /&gt;
    volumes:&lt;br /&gt;
      - ${CODEDIR}:/app/bluespice/w/&lt;br /&gt;
&lt;br /&gt;
  mailhog:&lt;br /&gt;
    image: mailhog/mailhog&lt;br /&gt;
    container_name: mailhog&lt;br /&gt;
    environment:&lt;br /&gt;
      VIRTUAL_HOST: ${WIKI_HOST}&lt;br /&gt;
      VIRTUAL_PATH: /_mailhog&lt;br /&gt;
      VIRTUAL_PORT: 8025&lt;br /&gt;
      VIRTUAL_DEST: /&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This will make the stack use your local codebase from &amp;lt;code&amp;gt;$CODEDIR&amp;lt;/code&amp;gt; and also expose a Mailhog web interface on &amp;lt;code&amp;gt;$Wiki_HOST/_mailhog&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In addition, if you want to work with a custom build of the &amp;lt;code&amp;gt;bluespice/wiki&amp;lt;/code&amp;gt; container, you can add an &amp;lt;code&amp;gt;image:&amp;lt;/code&amp;gt; entry to the respective services. Example&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;yaml&amp;quot;&amp;gt;&lt;br /&gt;
  wiki-installer:&lt;br /&gt;
    image: bluespice/wiki:dev&lt;br /&gt;
...&lt;br /&gt;
  wiki-web:&lt;br /&gt;
    image: bluespice/wiki:dev&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
  wiki-task:&lt;br /&gt;
    image: bluespice/wiki:dev&lt;br /&gt;
...&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories&amp;diff=13739</id>
		<title>Security:Security Advisories</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories&amp;diff=13739"/>
		<updated>2026-01-28T14:39:45Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;width:100%;&amp;quot;&lt;br /&gt;
! style=&amp;quot;&amp;quot; |Release name&lt;br /&gt;
! style=&amp;quot;&amp;quot; |Release date&lt;br /&gt;
! style=&amp;quot;&amp;quot; |Title&lt;br /&gt;
! style=&amp;quot;&amp;quot; |References&lt;br /&gt;
! style=&amp;quot;&amp;quot; |Summary&lt;br /&gt;
!Severity&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2026-01|BSSA-2026-01]]&lt;br /&gt;
|2026-01-28&lt;br /&gt;
|Security vulnerability in BlueSpice Collabpads database container.&lt;br /&gt;
|[https://avd.aquasec.com/nvd/2025/cve-2025-14847 CVE-2025-14847]&lt;br /&gt;
|Read of uninitialized heap memory&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |Low&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2025-07|BSSA-2025-07]]&lt;br /&gt;
|2025-12-10&lt;br /&gt;
|Security vulnerability in BlueSpice Search container.&lt;br /&gt;
|[https://avd.aquasec.com/nvd/2025/cve-2025-66516 CVE-2025-66516]&lt;br /&gt;
|XML Entity Injection&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |Low&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2025-06|BSSA-2025-06]]&lt;br /&gt;
|2025-10-28&lt;br /&gt;
|Security vulnerabilities in various MediaWiki extensions that are actually part of the BlueSpice distribution&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2024-56171 CVE-2024-56171], [https://www.cve.org/CVERecord?id=CVE-2025-3277 CVE-2025-3277], [https://www.cve.org/CVERecord?id=CVE-2025-6965 CVE-2025-6965], [https://www.cve.org/CVERecord?id=CVE-2025-11173 CVE-2025-11173], [https://www.cve.org/CVERecord?id=CVE-2025-11175 CVE-2025-11175],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-53625 CVE-2025-53625],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-54370 CVE-2025-54370],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-54874 CVE-2025-54874],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-59839 CVE-2025-59839],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61634 CVE-2025-61634],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61635 CVE-2025-61635],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61636 CVE-2025-61636],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61637 CVE-2025-61637],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61638 CVE-2025-61638],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61639 CVE-2025-61639],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61640 CVE-2025-61640],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61641 CVE-2025-61641],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61642 CVE-2025-61642],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61643 CVE-2025-61643],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61646 CVE-2025-61646],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61652 CVE-2025-61652],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61653 CVE-2025-61653],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61655 CVE-2025-61655],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61655 CVE-2025-61655],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61656 CVE-2025-61656],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61656 CVE-2025-61656],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61657 CVE-2025-61657],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-7458 CVE-2025-7458]&lt;br /&gt;
|Denial Of Service,&lt;br /&gt;
Cross-Site Scripting (XSS),&lt;br /&gt;
Information Disclosure,&lt;br /&gt;
Bypass authn at content check,&lt;br /&gt;
Server-side Request Forgery,&lt;br /&gt;
Arbitrary Code Execution,&lt;br /&gt;
Memory Corruption,&lt;br /&gt;
Use-After-Free,&lt;br /&gt;
Arbitrary SQL Execution&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-red-bg&amp;quot; |High&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2025-05|BSSA-2025-05]]&lt;br /&gt;
|2025-09-19&lt;br /&gt;
|XSS in Extension:AtMentions, Extension:BlueSpiceAvatars, Extension:BlueSpiceWhoIsOnline and Extension:CognitiveProcessDesigner&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2025-46703 CVE-2025-46703], [https://www.cve.org/CVERecord?id=CVE-2025-48007 CVE-2025-48007], [https://www.cve.org/CVERecord?id=CVE-2025-57880 CVE-2025-57880], [https://www.cve.org/CVERecord?id=CVE-2025-58114 CVE-2025-58114]&lt;br /&gt;
|&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-orange-bg&amp;quot; |Medium&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2025-04|BSSA-2025-04]]&lt;br /&gt;
|2025-09-18&lt;br /&gt;
|Security vulnerabilities in services &amp;lt;code&amp;gt;bluespice/search&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;bluespice/formular&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;bluespice/wiki&amp;lt;/code&amp;gt; &lt;br /&gt;
|[https://nvd.nist.gov/vuln/detail/CVE-2025-54988 CVE-2025-54988], [https://avd.aquasec.com/nvd/2025/cve-2025-7783 CVE-2025-7783], [https://avd.aquasec.com/nvd/cve-2025-58050 CVE-2025-58050], [https://avd.aquasec.com/nvd/cve-2025-49794 CVE-2025-49794], [https://avd.aquasec.com/nvd/cve-2025-49796 CVE-2025-49796]&lt;br /&gt;
|Denial-of-Service, Information Disclosure&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |Low&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2025-03|BSSA-2025-03]]&lt;br /&gt;
|2025-07-28&lt;br /&gt;
|Security vulnerabilities in Extension:Scribunto, Extension:TabberNeue, Extension:TwoColConflict and Extension:Quiz&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2025-53501 CVE-2025-53501], [https://www.cve.org/CVERecord?id=CVE-2025-53494 CVE-2025-53494], [https://www.cve.org/CVERecord?id=CVE-2025-53093 CVE-2025-53093], [https://www.cve.org/CVERecord?id=CVE-2025-7057 CVE-2025-7057]&lt;br /&gt;
|Information Disclosure, &lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-orange-bg&amp;quot; |Medium&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2025-02|BSSA-2025-02]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2025-04-17&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Security vulnerabilities in Extension:OAuth&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2025-32068 CVE-2025-32068], [https://www.cve.org/CVERecord?id=CVE-2025-32074 CVE-2025-32074]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Allows unauthorized access to the wiki, Cross-Site Scripting (XSS)&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-orange-bg&amp;quot; |Medium&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2025-01|BSSA-2025-01]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2025-01-20&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Security vulnerabilities in Extension:DataTransfer &lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2025-23081 CVE-2025-23081]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Allows Cross Site Request Forgery, Cross-Site Scripting (XSS)&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-orange-bg&amp;quot; |Medium&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2023-02|BSSA-2023-02]]&lt;br /&gt;
|2023-10-30&lt;br /&gt;
|Security vulnerabilities in Extension:BlueSpiceAvatars&lt;br /&gt;
|[https://www.cve.org/cverecord?id=CVE-2023-42431 CVE-2023-42431]&lt;br /&gt;
|Allows Cross-Site Scripting (XSS)&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |Low&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2023-01|BSSA-2023-01]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2023-07-25&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Ghostscript vulnerability&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2023-36664 CVE-2023-36664]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Code can be executed on the server via a manipulated PDF&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-orange-bg&amp;quot; |Medium&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-08|BSSA-2022-08]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-3895 CVE-2022-3895]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through use of interface elements&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-orange-bg&amp;quot; |Medium&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-07|BSSA-2022-07]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-3958 CVE-2022-3958]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through personal menu items&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-orange-bg&amp;quot; |Medium&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-06|BSSA-2022-06]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-3893 CVE-2022-3893]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through the custom menu&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |Low&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-05|BSSA-2022-05]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-42001 CVE-2022-42001]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through the book navigation&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |Low&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-04|BSSA-2022-04]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-41789 CVE-2022-41789], [https://www.cve.org/CVERecord?id=CVE-2022-41814 CVE-2022-41814], [https://www.cve.org/CVERecord?id=CVE-2022-42000 CVE-2022-42000]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through user preferences&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |Low&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-03|BSSA-2022-03]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-41611 CVE-2022-41611]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through main navigation&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |Low&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-02|BSSA-2022-02]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-2511 CVE-2022-2511]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through the &#039;title&#039; parameter&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-orange-bg&amp;quot; |Medium&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-01|BSSA-2022-01]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-01-31&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector in Search Center&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-2510 CVE-2022-2510]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |JavaScript in search field is reflected back to the browser.&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-orange-bg&amp;quot; |Medium&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2026-01&amp;diff=13738</id>
		<title>Security:Security Advisories/BSSA-2026-01</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2026-01&amp;diff=13738"/>
		<updated>2026-01-28T14:32:17Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2026-01-29&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|reported &amp;quot;high&amp;quot;, BlueSpice assessment: &#039;&#039;&#039;low&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
| Services in current LTS version &amp;lt; 5.1.4&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|5.2.1, 5.1.5&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
| [https://avd.aquasec.com/nvd/2025/cve-2025-14847 CVE-2025-14847]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Problem==&lt;br /&gt;
* Service &amp;lt;code&amp;gt;collabpads-database&amp;lt;/code&amp;gt; (image name: &amp;lt;code&amp;gt;mongo&amp;lt;/code&amp;gt; ) - [https://avd.aquasec.com/nvd/2025/cve-2025-14847 CVE-2025-14847]&lt;br /&gt;
&lt;br /&gt;
==Impact assessment==&lt;br /&gt;
* Service &amp;lt;code&amp;gt;collabpads-database&amp;lt;/code&amp;gt; (image name: &amp;lt;code&amp;gt;mongo&amp;lt;/code&amp;gt; ) &lt;br /&gt;
** A unauthenticated MongoDB client can attack the service if reachable.  By default BlueSpice setup, the service runs only in the background and can not be accessed from outside the virtual network. So not even unauthenticated access is possible from any external location.&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
To mitigate &amp;lt;code&amp;gt;CVE-2025-14847&amp;lt;/code&amp;gt;  use one of the following options:&lt;br /&gt;
&lt;br /&gt;
# Make sure the service has no access to the internet. This is the default configuration of BlueSpice setups.&lt;br /&gt;
# Update the &amp;lt;code&amp;gt;mongo&amp;lt;/code&amp;gt; docker image via BlueSpice&#039;s deploy tool: &amp;lt;code&amp;gt;bluespice-deploy pull collabpads-database &amp;amp;&amp;amp; bluespice-deploy up -d&amp;lt;/code&amp;gt; &lt;br /&gt;
# Update to version &amp;gt;=5.1.5 or &amp;gt;=5.2.1  of the BlueSpice images&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Setup:Installation_Guide/Docker&amp;diff=13717</id>
		<title>Setup:Installation Guide/Docker</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Setup:Installation_Guide/Docker&amp;diff=13717"/>
		<updated>2026-01-22T14:02:42Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Overview ==&lt;br /&gt;
Starting with version 4.5, BlueSpice MediaWiki can be installed with a stack of Docker container images. &lt;br /&gt;
&lt;br /&gt;
Everything is built in a modular way to allow different types of setups.&lt;br /&gt;
&lt;br /&gt;
The most common cases are:&lt;br /&gt;
# &amp;quot;All-in-one&amp;quot; (with and without Let&#039;s Encrypt)&lt;br /&gt;
# Custom database and search service&lt;br /&gt;
# Custom load balancer / proxy&lt;br /&gt;
&lt;br /&gt;
== Architecture ==&lt;br /&gt;
&amp;lt;drawio filename=&amp;quot;Setup:Installation_Guide_Docker-Achitecture&amp;quot; alt=&amp;quot;Diagram of BlueSpice Docker Stack Architecture&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Notes&#039;&#039;&#039;&lt;br /&gt;
* Internal HTTP connections may use non-standard ports. Those are noted next to the respective services.&lt;br /&gt;
** HTTP (in-secure) is only used for internal communication within the virtual network the stack is operated in. All connections to the client use TLS.&lt;br /&gt;
* Proprietary ports (esp. for database connections) are noted next to the respective services.&lt;br /&gt;
* There may be additional services and ports in use, based on the setup. Some examples:&lt;br /&gt;
** When using LDAP based authentication an LDAPS connection (port &amp;lt;code&amp;gt;636&amp;lt;/code&amp;gt;) is used from the &amp;lt;code&amp;gt;bluespice/wiki&amp;lt;/code&amp;gt; containers to the LDAP-Server&lt;br /&gt;
** When using Kerberos authentication, a connection (port &amp;lt;code&amp;gt;88&amp;lt;/code&amp;gt;) is used from the &amp;lt;code&amp;gt;bluespice/kerberos-proxy&amp;lt;/code&amp;gt; containers to the Kerberos-Server&lt;br /&gt;
** When using DeepL or OpenAI services, a HTTPS connection (port &amp;lt;code&amp;gt;443&amp;lt;/code&amp;gt;) is used from the &amp;lt;code&amp;gt;bluespice/wiki&amp;lt;/code&amp;gt; containers to to the respective service&lt;br /&gt;
** When using OpenIDConnect authentication, a HTTPS connection (port &amp;lt;code&amp;gt;443&amp;lt;/code&amp;gt;) is used from the &amp;lt;code&amp;gt;bluespice/wiki&amp;lt;/code&amp;gt; &amp;quot;task&amp;quot; container to to the authentication provider&lt;br /&gt;
** When using &amp;quot;Let&#039;s Encrypt&amp;quot; Certbot, a HTTPS connection (port &amp;lt;code&amp;gt;443&amp;lt;/code&amp;gt;) is used from the &amp;lt;code&amp;gt;acme-companion&amp;lt;/code&amp;gt; container to the &amp;quot;Let&#039;s Encrypt&amp;quot; service&lt;br /&gt;
&lt;br /&gt;
== Step 1: Get the stack ==&lt;br /&gt;
Load project &amp;lt;code&amp;gt;bluespice-deploy&amp;lt;/code&amp;gt; from https://github.com/hallowelt/bluespice-deploy/releases/latest and enter the sub-directory &amp;lt;code&amp;gt;compose&amp;lt;/code&amp;gt; for Docker Compose files.&lt;br /&gt;
&lt;br /&gt;
For example, run:&lt;br /&gt;
&amp;lt;syntaxhighlight lang=sh&amp;gt;&lt;br /&gt;
wget https://github.com/hallowelt/bluespice-deploy/archive/refs/tags/5.2.1.zip \&lt;br /&gt;
  &amp;amp;&amp;amp; unzip 5.2.1.zip \&lt;br /&gt;
  &amp;amp;&amp;amp; cd bluespice-deploy-5.2.1/compose&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The directory contains the following files:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
! style=&amp;quot;width:375px;&amp;quot; |Filename&lt;br /&gt;
! style=&amp;quot;&amp;quot; |Type&lt;br /&gt;
! style=&amp;quot;&amp;quot; |Comment&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:375px;&amp;quot; |&amp;lt;code&amp;gt;bluespice-deploy&amp;lt;/code&amp;gt;&lt;br /&gt;
| style=&amp;quot;&amp;quot; |shell script&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Start-up script, wrapping command &amp;lt;code&amp;gt;docker compose&amp;lt;/code&amp;gt; and service &amp;lt;code&amp;gt;yml&amp;lt;/code&amp;gt; files.&amp;lt;br&amp;gt;Additional service &amp;lt;code&amp;gt;yml&amp;lt;/code&amp;gt; files can be loaded by adding &amp;lt;code&amp;gt;-f &amp;lt;filename&amp;gt; &amp;lt;/code&amp;gt;.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:375px;&amp;quot; |&amp;lt;code&amp;gt;docker-compose.main.yml&amp;lt;/code&amp;gt;&lt;br /&gt;
| style=&amp;quot;&amp;quot; |yml&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Main containers of the wiki (&amp;lt;code&amp;gt;wiki-web&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;wiki-task&amp;lt;/code&amp;gt;).&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:375px;&amp;quot; |&amp;lt;code&amp;gt;docker-compose.persistent-data-services.yml&amp;lt;/code&amp;gt;&lt;br /&gt;
| style=&amp;quot;&amp;quot; |yml&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Containers of database and search services, storing persistent data onto the file system.&amp;lt;br /&amp;gt;Optionally with external MySQL/MariaDB and OpenSearch one can skip loading this &amp;lt;code&amp;gt;.yml&amp;lt;/code&amp;gt; in &amp;lt;code&amp;gt;bluespice-deploy&amp;lt;/code&amp;gt;. Please then wire your services properly in the &amp;lt;code&amp;gt;.env&amp;lt;/code&amp;gt; file.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:375px;&amp;quot; |&amp;lt;code&amp;gt;docker-compose.stateless-services.yml&amp;lt;/code&amp;gt;&lt;br /&gt;
| style=&amp;quot;&amp;quot; |yml&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Containers for caching, PDF rendering, formula-rendering and diagram editing.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:375px;&amp;quot; |&amp;lt;code&amp;gt;docker-compose.helper-service.yml&amp;lt;/code&amp;gt;&lt;br /&gt;
| style=&amp;quot;&amp;quot; |yml&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Helper containers for file system preparation and automated BlueSpice upgrade.&amp;lt;br&amp;gt;These containers exit automatically after finishing tasks.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:375px;&amp;quot; |&amp;lt;code&amp;gt;docker-compose.proxy.yml&amp;lt;/code&amp;gt;&lt;br /&gt;
| style=&amp;quot;&amp;quot; |yml&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Container of proxy service. Can be replaced by existing proxy/load-balancer infrastructure.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:375px;&amp;quot; |&amp;lt;code&amp;gt;docker-compose.proxy-letsencrypt.yml&amp;lt;/code&amp;gt;&lt;br /&gt;
| style=&amp;quot;&amp;quot; |yml&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Additional service for auto-renewal of &amp;quot;Let&#039;s Encrypt&amp;quot; certificates.&amp;lt;br&amp;gt;Only required when using the Let&#039;s Encrypt service and having no other TLS termination.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:375px;&amp;quot; |&amp;lt;code&amp;gt;docker-compose.kerberos-proxy.yml&amp;lt;/code&amp;gt;&lt;br /&gt;
| style=&amp;quot;&amp;quot; |yml&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Additional proxy for Kerberos based authentication.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:375px;&amp;quot; |&amp;lt;code&amp;gt;docker-compose.collabpads-service.yml&amp;lt;/code&amp;gt;&lt;br /&gt;
|yml&lt;br /&gt;
|Containers of back-end services for [[Manual:Extension/CollabPads|CollabPads]] (included in Pro and Farm editions).&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:375px;&amp;quot; |&amp;lt;code&amp;gt;.env.sample&amp;lt;/code&amp;gt;&lt;br /&gt;
| style=&amp;quot;&amp;quot; |text&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Sample for creating &amp;lt;code&amp;gt;.env&amp;lt;/code&amp;gt; that defines key environment variables.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:375px;&amp;quot; |&amp;lt;code&amp;gt;bluespice.service.demo&amp;lt;/code&amp;gt;&lt;br /&gt;
| style=&amp;quot;&amp;quot; |service script&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Demo-file for control the BlueSpice stack as a &amp;lt;code&amp;gt;systemctl&amp;lt;/code&amp;gt; service.&amp;lt;br&amp;gt;One can create e.g a &amp;lt;code&amp;gt;/etc/systemd/system/bluespice.service&amp;lt;/code&amp;gt;.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Step 2: Set up environment variables ==&lt;br /&gt;
Create your &amp;lt;code&amp;gt;.env&amp;lt;/code&amp;gt; based on the sample file &amp;lt;code&amp;gt;.env.sample&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# set or use your data directory &lt;br /&gt;
DATADIR=/data/bluespice&lt;br /&gt;
VERSION=5.1.3&lt;br /&gt;
EDITION=free&lt;br /&gt;
BACKUP_HOUR=04&lt;br /&gt;
&lt;br /&gt;
WIKI_NAME=BlueSpice&lt;br /&gt;
WIKI_LANG=en&lt;br /&gt;
WIKI_PASSWORDSENDER=no-reply@wiki.company.local&lt;br /&gt;
WIKI_EMERGENCYCONTACT=no-reply@wiki.company.local&lt;br /&gt;
WIKI_HOST=wiki.company.local&lt;br /&gt;
WIKI_PORT=443&lt;br /&gt;
WIKI_PROTOCOL=https&lt;br /&gt;
WIKI_BASE_PATH=&lt;br /&gt;
&lt;br /&gt;
DB_USER=set_or_use_your_db_user_name&lt;br /&gt;
DB_PASS=SET_OR_USE_YOUR_DB_PASS_WORD&lt;br /&gt;
DB_ROOT_USER=root &lt;br /&gt;
DB_ROOT_PASS=$DB_PASS&lt;br /&gt;
DB_HOST=database&lt;br /&gt;
DB_NAME=bluespice&lt;br /&gt;
DB_PREFIX=&lt;br /&gt;
&lt;br /&gt;
SMTP_HOST=mail.company.local&lt;br /&gt;
SMTP_PORT=25&lt;br /&gt;
SMTP_USER=...&lt;br /&gt;
SMTP_PASS=...&lt;br /&gt;
SMTP_ID_HOST=...&lt;br /&gt;
&lt;br /&gt;
LETSENCRYPT=false&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
{{Textbox|boxtype=note|header=Different editions|text=This config works for all editions, but the main image of Pro or Farm edition needs to be obtained differently, see [[{{FULLPAGENAME}}/Pro and Farm edition|Pro and Farm edition]]|icon=yes}}&lt;br /&gt;
&lt;br /&gt;
== Step 3: Start the stack ==&lt;br /&gt;
Use &amp;lt;code&amp;gt;bluespice-deploy up -d&amp;lt;/code&amp;gt; to start the stack. Once all containers are shown as &amp;quot;ready&amp;quot; you can navigate to &amp;lt;code&amp;gt;$WIKI_PROTOCOL://$WIKI_HOST:$WIKI_PORT&amp;lt;/code&amp;gt; (e.g. &amp;lt;code&amp;gt;&amp;lt;nowiki&amp;gt;https://wiki.company.local&amp;lt;/nowiki&amp;gt;&amp;lt;/code&amp;gt;) in your preferred web browser and start using the application.&lt;br /&gt;
&lt;br /&gt;
When starting the stack the first time, the &amp;lt;code&amp;gt;wiki-task&amp;lt;/code&amp;gt; container will automatically perform the installation. It may take a couple of minutes for the process to set up the database and complete. Once it is finished, the password for the default &amp;lt;code&amp;gt;Admin&amp;lt;/code&amp;gt; user can be found in &amp;lt;code&amp;gt;$DATADIR/wiki/initialAdminPassword&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
== Additional options ==&lt;br /&gt;
&lt;br /&gt;
=== Add Customizations to containers ===&lt;br /&gt;
Starting with bluespice-deploy 5.1.4 and 5.2.0 Branches, we allow to edit and maintan   a separate   &amp;lt;code&amp;gt;docker-compose.override,yml&amp;lt;/code&amp;gt;  which will be ignored by git.&lt;br /&gt;
&lt;br /&gt;
This way you can add your own Container-Configurations and be able to maintain your git status up to date. just place the file next to the other docker-compose.*.ymls and run ./bluespice-deploy up -d&lt;br /&gt;
&lt;br /&gt;
Example:&amp;lt;syntaxhighlight lang=&amp;quot;yaml&amp;quot;&amp;gt;&lt;br /&gt;
services:&lt;br /&gt;
  wiki-web:&lt;br /&gt;
    volumes:&lt;br /&gt;
      - /backup/:/data/backup&lt;br /&gt;
  wiki-task:&lt;br /&gt;
    volumes:&lt;br /&gt;
      - /backup/:/data/backup&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Configs for &amp;lt;code&amp;gt;LocalSettings.php&amp;lt;/code&amp;gt; ===&lt;br /&gt;
Instead of exposing the &amp;lt;code&amp;gt;LocalSettings.php&amp;lt;/code&amp;gt; for [[mediawikiwiki:Manual:LocalSettings.php|adding additional configurations]], the stack offers two entry points. After the initial installation, you can add your configs to two files in &amp;lt;code&amp;gt;${DATADIR}/wiki/bluespice/&amp;lt;/code&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;code&amp;gt;pre-init-settings.php&amp;lt;/code&amp;gt;  - Set configs before the initialization of BlueSpice&#039;s debug logging, libraries, skins, extensions and default settings.  Configs set here can be picked up by the init process.&lt;br /&gt;
* &amp;lt;code&amp;gt;post-init-settings.php&amp;lt;/code&amp;gt; - Set configs after the initialization, manipulating configs that have been set by the init process.&lt;br /&gt;
For example, if you add the following lines to &amp;lt;code&amp;gt;pre-init-settings.php&amp;lt;/code&amp;gt;, you can then read outputted debug logs (if any) in &amp;lt;code&amp;gt;${DATADIR}/wiki/bluespice/logs/debug.log&amp;lt;/code&amp;gt;:&amp;lt;syntaxhighlight lang=&amp;quot;php&amp;quot;&amp;gt;&lt;br /&gt;
$GLOBALS[&#039;bsgDebugLogGroups&#039;][&#039;exception&#039;] = &amp;quot;/data/bluespice/logs/debug.log&amp;quot;;&lt;br /&gt;
$wgShowExceptionDetails = true;&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Maintenance scripts ===&lt;br /&gt;
To run [[Setup:Installation Guide/Advanced/Maintenance scripts|maintenance scripts]] from MediaWiki or from other extensions, please use the &amp;lt;code&amp;gt;wiki-task&amp;lt;/code&amp;gt; container, which handles all back-end jobs and processes. You can connect into the container in two different ways:&lt;br /&gt;
&lt;br /&gt;
* run &amp;lt;code&amp;gt;./bluespice-deploy exec -it wiki-task bash&amp;lt;/code&amp;gt; in the &amp;lt;code&amp;gt;compose&amp;lt;/code&amp;gt; directory for Docker Compose files&lt;br /&gt;
* or alternatively, run &amp;lt;code&amp;gt;docker exec -it bluespice-wiki-task bash&amp;lt;/code&amp;gt; wherever you are on the host machine&lt;br /&gt;
&lt;br /&gt;
Inside the container you can enter the wiki&#039;s code base with &amp;lt;code&amp;gt;cd /app/bluespice/w&amp;lt;/code&amp;gt; , where one can run scripts like &amp;lt;code&amp;gt;php maintenance/run.php update --quick&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;php extensions/BlueSpiceExtendedSearch/maintenance/updateWikiPageIndex.php&amp;lt;/code&amp;gt; and so on.&lt;br /&gt;
&lt;br /&gt;
=== SSL certificates ===&lt;br /&gt;
To use a Let&#039;s Encrypt certificate for your domain name, set &amp;lt;code&amp;gt;LETSENCRYPT=true&amp;lt;/code&amp;gt; in your &amp;lt;code&amp;gt;.env&amp;lt;/code&amp;gt; file.&lt;br /&gt;
&lt;br /&gt;
To use a self-signend certificate for your domain name, put its &amp;lt;code&amp;gt;.crt&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;.key&amp;lt;/code&amp;gt; files in &amp;lt;code&amp;gt;${DATADIR}/proxy/certs&amp;lt;/code&amp;gt;. For example, with &amp;lt;code&amp;gt;wiki.company.local&amp;lt;/code&amp;gt; you should prepare &amp;lt;code&amp;gt;wiki.company.local.crt&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;wiki.company.local.key&amp;lt;/code&amp;gt; files.&lt;br /&gt;
&lt;br /&gt;
=== Kerberos proxy ===&lt;br /&gt;
For implicit authentication using Kerberos, an additional proxy must be used: &amp;lt;code&amp;gt;bluespice/kerberos-proxy&amp;lt;/code&amp;gt; . The file &amp;lt;code&amp;gt;docker-compose.kerberos-proxy.yml&amp;lt;/code&amp;gt; contains a common configuration. It can be used &#039;&#039;&#039;instead of&#039;&#039;&#039; the regular &amp;lt;code&amp;gt;docker-compose.proxy.yml&amp;lt;/code&amp;gt; file inside &amp;lt;code&amp;gt;bluespice-deploy&amp;lt;/code&amp;gt; .&lt;br /&gt;
&lt;br /&gt;
Make sure to have the files&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;code&amp;gt;${DATADIR}/kerberos/krb5.conf&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;${DATADIR}/kerberos/kerberos.keytab&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
set up properly.&lt;br /&gt;
&lt;br /&gt;
The file &amp;lt;code&amp;gt;${DATADIR}/wiki/bluespice/pre-init-settings.php&amp;lt;/code&amp;gt; can then be used to set up [[mediawikiwiki:LDAP_hub|&amp;quot;Extension:Auth_remoteuser&amp;quot; and the LDAP stack extensions]].&lt;br /&gt;
&lt;br /&gt;
=== SAML authentication ===&lt;br /&gt;
During the initial installation a certificate for message signing will automatically be created. It can be found in &amp;lt;code&amp;gt;${DATADIR}/wiki/simplesamlphp/certs/&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
In order to configure a remote IdP, one must copy the IdP metadata XML to a file called &amp;lt;code&amp;gt;${DATADIR}/wiki/simplesamlphp/saml_idp_metadata.xml&amp;lt;/code&amp;gt;. The SP metadata can then be obtained via &amp;lt;code&amp;gt;&amp;lt;nowiki&amp;gt;https://{{$WIKI_HOST}}/_sp/module.php/saml/sp/metadata.php/default-sp&amp;lt;/nowiki&amp;gt;&amp;lt;/code&amp;gt;. It must be configured in the remote IdP.&lt;br /&gt;
&lt;br /&gt;
{{Textbox&lt;br /&gt;
|boxtype=tip&lt;br /&gt;
|header=Test authentication&lt;br /&gt;
|text= You can test authentication directly within the SimpleSAMLphp application. To do so, navigate to &amp;lt;code&amp;gt;&amp;lt;nowiki&amp;gt;https://{{$WIKI_HOST}}/_sp/module.php/admin&amp;lt;/nowiki&amp;gt;&amp;lt;/code&amp;gt; and log in with &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; and the &amp;lt;code&amp;gt;INTERNAL_SIMPLESAMLPHP_ADMIN_PASS&amp;lt;/code&amp;gt; found in &amp;lt;code&amp;gt;${DATADIR}/wiki/.wikienv&amp;lt;/code&amp;gt;&lt;br /&gt;
|icon=yes&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
Next, the extensions &amp;quot;PluggableAuth&amp;quot; and &amp;quot;SimpleSAMLphp&amp;quot; must be enabled on the wiki. To do so, add&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;php&amp;quot;&amp;gt;&lt;br /&gt;
wfLoadExtensions( [&lt;br /&gt;
    &#039;PluggableAuth&#039;,&lt;br /&gt;
    &#039;SimpleSAMLphp&#039;&lt;br /&gt;
] );&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;[[File:Setup:SAML ConfigManager EN 01.png|thumb|300x300px]]to the &amp;lt;code&amp;gt;${DATADIR}/wiki/bluespice/post-init-settings.php&amp;lt;/code&amp;gt;. Run&lt;br /&gt;
&lt;br /&gt;
 ./bluespice-deploy exec wiki-task /app/bluespice/w/maintenance/update.php --quick&lt;br /&gt;
&lt;br /&gt;
to complete the installation.&lt;br /&gt;
&lt;br /&gt;
After that, the authentication plugin configuration can be applied in [[Manual:Extension/BlueSpiceConfigManager|Special:BlueSpiceConfigManager]] under &amp;quot;Authentication&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== OpenID Connect authentication ===&lt;br /&gt;
&lt;br /&gt;
The extensions &amp;quot;PluggableAuth&amp;quot; and &amp;quot;OpenIDConnect&amp;quot; must be enabled on the wiki. To do so, add&amp;lt;syntaxhighlight lang=&amp;quot;php&amp;quot;&amp;gt;&lt;br /&gt;
wfLoadExtensions( [&lt;br /&gt;
    &#039;PluggableAuth&#039;,&lt;br /&gt;
    &#039;OpenIDConnect&#039;&lt;br /&gt;
] );&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;to the &amp;lt;code&amp;gt;${DATADIR}/wiki/bluespice/post-init-settings.php&amp;lt;/code&amp;gt;. Run&lt;br /&gt;
&lt;br /&gt;
 ./bluespice-deploy exec wiki-task /app/bluespice/w/maintenance/update.php --quick&lt;br /&gt;
&lt;br /&gt;
to complete the installation.&lt;br /&gt;
&lt;br /&gt;
After that, the authentication plugin configuration can be applied in [[Manual:Extension/BlueSpiceConfigManager|Special:BlueSpiceConfigManager]] under &amp;quot;Authentication&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
[[de:Setup:Installationsanleitung/Docker]]&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Setup:Installation_Guide/Docker&amp;diff=13716</id>
		<title>Setup:Installation Guide/Docker</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Setup:Installation_Guide/Docker&amp;diff=13716"/>
		<updated>2026-01-22T14:00:52Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Overview ==&lt;br /&gt;
Starting with version 4.5, BlueSpice MediaWiki can be installed with a stack of Docker container images. &lt;br /&gt;
&lt;br /&gt;
Everything is built in a modular way to allow different types of setups.&lt;br /&gt;
&lt;br /&gt;
The most common cases are:&lt;br /&gt;
# &amp;quot;All-in-one&amp;quot; (with and without Let&#039;s Encrypt)&lt;br /&gt;
# Custom database and search service&lt;br /&gt;
# Custom load balancer / proxy&lt;br /&gt;
&lt;br /&gt;
== Architecture ==&lt;br /&gt;
&amp;lt;drawio filename=&amp;quot;Setup:Installation_Guide_Docker-Achitecture&amp;quot; alt=&amp;quot;Diagram of BlueSpice Docker Stack Architecture&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Notes&#039;&#039;&#039;&lt;br /&gt;
* Internal HTTP connections may use non-standard ports. Those are noted next to the respective services.&lt;br /&gt;
** HTTP (in-secure) is only used for internal communication within the virtual network the stack is operated in. All connections to the client use TLS.&lt;br /&gt;
* Proprietary ports (esp. for database connections) are noted next to the respective services.&lt;br /&gt;
* There may be additional services and ports in use, based on the setup. Some examples:&lt;br /&gt;
** When using LDAP based authentication an LDAPS connection (port &amp;lt;code&amp;gt;636&amp;lt;/code&amp;gt;) is used from the &amp;lt;code&amp;gt;bluespice/wiki&amp;lt;/code&amp;gt; containers to the LDAP-Server&lt;br /&gt;
** When using Kerberos authentication, a connection (port &amp;lt;code&amp;gt;88&amp;lt;/code&amp;gt;) is used from the &amp;lt;code&amp;gt;bluespice/kerberos-proxy&amp;lt;/code&amp;gt; containers to the Kerberos-Server&lt;br /&gt;
** When using DeepL or OpenAI services, a HTTPS connection (port &amp;lt;code&amp;gt;443&amp;lt;/code&amp;gt;) is used from the &amp;lt;code&amp;gt;bluespice/wiki&amp;lt;/code&amp;gt; containers to to the respective service&lt;br /&gt;
** When using OpenIDConnect authentication, a HTTPS connection (port &amp;lt;code&amp;gt;443&amp;lt;/code&amp;gt;) is used from the &amp;lt;code&amp;gt;bluespice/wiki&amp;lt;/code&amp;gt; &amp;quot;task&amp;quot; container to to the authentication provider&lt;br /&gt;
** When using &amp;quot;Let&#039;s Encrypt&amp;quot; Certbot, a HTTPS connection (port &amp;lt;code&amp;gt;443&amp;lt;/code&amp;gt;) is used from the &amp;lt;code&amp;gt;acme-companion&amp;lt;/code&amp;gt; container to the &amp;quot;Let&#039;s Encrypt&amp;quot; service&lt;br /&gt;
&lt;br /&gt;
== Step 1: Get the stack ==&lt;br /&gt;
Load project &amp;lt;code&amp;gt;bluespice-deploy&amp;lt;/code&amp;gt; from https://github.com/hallowelt/bluespice-deploy/releases/latest and enter the sub-directory &amp;lt;code&amp;gt;compose&amp;lt;/code&amp;gt; for Docker Compose files.&lt;br /&gt;
&lt;br /&gt;
For example, run:&lt;br /&gt;
&amp;lt;syntaxhighlight lang=sh&amp;gt;&lt;br /&gt;
wget https://github.com/hallowelt/bluespice-deploy/archive/refs/tags/5.2.1.zip \&lt;br /&gt;
  &amp;amp;&amp;amp; unzip 5.2.1.zip \&lt;br /&gt;
  &amp;amp;&amp;amp; cd bluespice-deploy-5.2.1/compose&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The directory contains the following files:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
! style=&amp;quot;width:375px;&amp;quot; |Filename&lt;br /&gt;
! style=&amp;quot;&amp;quot; |Type&lt;br /&gt;
! style=&amp;quot;&amp;quot; |Comment&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:375px;&amp;quot; |&amp;lt;code&amp;gt;bluespice-deploy&amp;lt;/code&amp;gt;&lt;br /&gt;
| style=&amp;quot;&amp;quot; |shell script&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Start-up script, wrapping command &amp;lt;code&amp;gt;docker compose&amp;lt;/code&amp;gt; and service &amp;lt;code&amp;gt;yml&amp;lt;/code&amp;gt; files.&amp;lt;br&amp;gt;Additional service &amp;lt;code&amp;gt;yml&amp;lt;/code&amp;gt; files can be loaded by adding &amp;lt;code&amp;gt;-f &amp;lt;filename&amp;gt; &amp;lt;/code&amp;gt;.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:375px;&amp;quot; |&amp;lt;code&amp;gt;docker-compose.main.yml&amp;lt;/code&amp;gt;&lt;br /&gt;
| style=&amp;quot;&amp;quot; |yml&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Main containers of the wiki (&amp;lt;code&amp;gt;wiki-web&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;wiki-task&amp;lt;/code&amp;gt;).&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:375px;&amp;quot; |&amp;lt;code&amp;gt;docker-compose.persistent-data-services.yml&amp;lt;/code&amp;gt;&lt;br /&gt;
| style=&amp;quot;&amp;quot; |yml&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Containers of database and search services, storing persistent data onto the file system.&amp;lt;br /&amp;gt;Optionally with external MySQL/MariaDB and OpenSearch one can skip loading this &amp;lt;code&amp;gt;.yml&amp;lt;/code&amp;gt; in &amp;lt;code&amp;gt;bluespice-deploy&amp;lt;/code&amp;gt;. Please then wire your services properly in the &amp;lt;code&amp;gt;.env&amp;lt;/code&amp;gt; file.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:375px;&amp;quot; |&amp;lt;code&amp;gt;docker-compose.stateless-services.yml&amp;lt;/code&amp;gt;&lt;br /&gt;
| style=&amp;quot;&amp;quot; |yml&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Containers for caching, PDF rendering, formula-rendering and diagram editing.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:375px;&amp;quot; |&amp;lt;code&amp;gt;docker-compose.helper-service.yml&amp;lt;/code&amp;gt;&lt;br /&gt;
| style=&amp;quot;&amp;quot; |yml&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Helper containers for file system preparation and automated BlueSpice upgrade.&amp;lt;br&amp;gt;These containers exit automatically after finishing tasks.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:375px;&amp;quot; |&amp;lt;code&amp;gt;docker-compose.proxy.yml&amp;lt;/code&amp;gt;&lt;br /&gt;
| style=&amp;quot;&amp;quot; |yml&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Container of proxy service. Can be replaced by existing proxy/load-balancer infrastructure.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:375px;&amp;quot; |&amp;lt;code&amp;gt;docker-compose.proxy-letsencrypt.yml&amp;lt;/code&amp;gt;&lt;br /&gt;
| style=&amp;quot;&amp;quot; |yml&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Additional service for auto-renewal of &amp;quot;Let&#039;s Encrypt&amp;quot; certificates.&amp;lt;br&amp;gt;Only required when using the Let&#039;s Encrypt service and having no other TLS termination.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:375px;&amp;quot; |&amp;lt;code&amp;gt;docker-compose.kerberos-proxy.yml&amp;lt;/code&amp;gt;&lt;br /&gt;
| style=&amp;quot;&amp;quot; |yml&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Additional proxy for Kerberos based authentication.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:375px;&amp;quot; |&amp;lt;code&amp;gt;docker-compose.collabpads-service.yml&amp;lt;/code&amp;gt;&lt;br /&gt;
|yml&lt;br /&gt;
|Containers of back-end services for [[Manual:Extension/CollabPads|CollabPads]] (included in Pro and Farm editions).&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:375px;&amp;quot; |&amp;lt;code&amp;gt;.env.sample&amp;lt;/code&amp;gt;&lt;br /&gt;
| style=&amp;quot;&amp;quot; |text&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Sample for creating &amp;lt;code&amp;gt;.env&amp;lt;/code&amp;gt; that defines key environment variables.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:375px;&amp;quot; |&amp;lt;code&amp;gt;bluespice.service.demo&amp;lt;/code&amp;gt;&lt;br /&gt;
| style=&amp;quot;&amp;quot; |service script&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Demo-file for control the BlueSpice stack as a &amp;lt;code&amp;gt;systemctl&amp;lt;/code&amp;gt; service.&amp;lt;br&amp;gt;One can create e.g a &amp;lt;code&amp;gt;/etc/systemd/system/bluespice.service&amp;lt;/code&amp;gt;.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Step 2: Set up environment variables ==&lt;br /&gt;
Create your &amp;lt;code&amp;gt;.env&amp;lt;/code&amp;gt; based on the sample file &amp;lt;code&amp;gt;.env.sample&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# set or use your data directory &lt;br /&gt;
DATADIR=/data/bluespice&lt;br /&gt;
VERSION=5.1.3&lt;br /&gt;
EDITION=free&lt;br /&gt;
BACKUP_HOUR=04&lt;br /&gt;
&lt;br /&gt;
WIKI_NAME=BlueSpice&lt;br /&gt;
WIKI_LANG=en&lt;br /&gt;
WIKI_PASSWORDSENDER=no-reply@wiki.company.local&lt;br /&gt;
WIKI_EMERGENCYCONTACT=no-reply@wiki.company.local&lt;br /&gt;
WIKI_HOST=wiki.company.local&lt;br /&gt;
WIKI_PORT=443&lt;br /&gt;
WIKI_PROTOCOL=https&lt;br /&gt;
WIKI_BASE_PATH=&lt;br /&gt;
&lt;br /&gt;
DB_USER=set_or_use_your_db_user_name&lt;br /&gt;
DB_PASS=SET_OR_USE_YOUR_DB_PASS_WORD&lt;br /&gt;
DB_ROOT_USER=root &lt;br /&gt;
DB_ROOT_PASS=$DB_PASS&lt;br /&gt;
DB_HOST=database&lt;br /&gt;
DB_NAME=bluespice&lt;br /&gt;
DB_PREFIX=&lt;br /&gt;
&lt;br /&gt;
SMTP_HOST=mail.company.local&lt;br /&gt;
SMTP_PORT=25&lt;br /&gt;
SMTP_USER=...&lt;br /&gt;
SMTP_PASS=...&lt;br /&gt;
SMTP_ID_HOST=...&lt;br /&gt;
&lt;br /&gt;
LETSENCRYPT=false&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
{{Textbox|boxtype=note|header=Different editions|text=This config works for all editions, but the main image of Pro or Farm edition needs to be obtained differently, see [[{{FULLPAGENAME}}/Pro and Farm edition|Pro and Farm edition]]|icon=yes}}&lt;br /&gt;
&lt;br /&gt;
== Step 3: Start the stack ==&lt;br /&gt;
Use &amp;lt;code&amp;gt;bluespice-deploy up -d&amp;lt;/code&amp;gt; to start the stack. Once all containers are shown as &amp;quot;ready&amp;quot; you can navigate to &amp;lt;code&amp;gt;$WIKI_PROTOCOL://$WIKI_HOST:$WIKI_PORT&amp;lt;/code&amp;gt; (e.g. &amp;lt;code&amp;gt;&amp;lt;nowiki&amp;gt;https://wiki.company.local&amp;lt;/nowiki&amp;gt;&amp;lt;/code&amp;gt;) in your preferred web browser and start using the application.&lt;br /&gt;
&lt;br /&gt;
When starting the stack the first time, the &amp;lt;code&amp;gt;wiki-task&amp;lt;/code&amp;gt; container will automatically perform the installation. It may take a couple of minutes for the process to set up the database and complete. Once it is finished, the password for the default &amp;lt;code&amp;gt;Admin&amp;lt;/code&amp;gt; user can be found in &amp;lt;code&amp;gt;$DATADIR/wiki/initialAdminPassword&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
== Additional options ==&lt;br /&gt;
&lt;br /&gt;
=== Add Customizations to containers ===&lt;br /&gt;
Starting with bluespice-deploy 5.1.4 and 5.2.0 Branches, we allow to edit and maintan   a separate   &amp;lt;code&amp;gt;docker-compose.override,yml&amp;lt;/code&amp;gt;  which will be ignored by git.&lt;br /&gt;
&lt;br /&gt;
This way you can add your own Container-Configurations and be able to maintain your git status up to date. just place the file next to the other docker-compose.*.ymls and run ./bluespice-deploy up -d&lt;br /&gt;
&lt;br /&gt;
Example:&amp;lt;syntaxhighlight lang=&amp;quot;yaml&amp;quot;&amp;gt;&lt;br /&gt;
services:&lt;br /&gt;
  wiki-web:&lt;br /&gt;
    volumes:&lt;br /&gt;
      - /code/extensions/X:/app/bluespice/w/extensions/X&lt;br /&gt;
      - /backup/:/data/backup&lt;br /&gt;
  wiki-task:&lt;br /&gt;
    volumes:&lt;br /&gt;
      - /backup/:/data/backup&lt;br /&gt;
      - /code/extensions/X:/app/bluespice/w/extensions/X&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Configs for &amp;lt;code&amp;gt;LocalSettings.php&amp;lt;/code&amp;gt; ===&lt;br /&gt;
Instead of exposing the &amp;lt;code&amp;gt;LocalSettings.php&amp;lt;/code&amp;gt; for [[mediawikiwiki:Manual:LocalSettings.php|adding additional configurations]], the stack offers two entry points. After the initial installation, you can add your configs to two files in &amp;lt;code&amp;gt;${DATADIR}/wiki/bluespice/&amp;lt;/code&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;code&amp;gt;pre-init-settings.php&amp;lt;/code&amp;gt;  - Set configs before the initialization of BlueSpice&#039;s debug logging, libraries, skins, extensions and default settings.  Configs set here can be picked up by the init process.&lt;br /&gt;
* &amp;lt;code&amp;gt;post-init-settings.php&amp;lt;/code&amp;gt; - Set configs after the initialization, manipulating configs that have been set by the init process.&lt;br /&gt;
For example, if you add the following lines to &amp;lt;code&amp;gt;pre-init-settings.php&amp;lt;/code&amp;gt;, you can then read outputted debug logs (if any) in &amp;lt;code&amp;gt;${DATADIR}/wiki/bluespice/logs/debug.log&amp;lt;/code&amp;gt;:&amp;lt;syntaxhighlight lang=&amp;quot;php&amp;quot;&amp;gt;&lt;br /&gt;
$GLOBALS[&#039;bsgDebugLogGroups&#039;][&#039;exception&#039;] = &amp;quot;/data/bluespice/logs/debug.log&amp;quot;;&lt;br /&gt;
$wgShowExceptionDetails = true;&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Maintenance scripts ===&lt;br /&gt;
To run [[Setup:Installation Guide/Advanced/Maintenance scripts|maintenance scripts]] from MediaWiki or from other extensions, please use the &amp;lt;code&amp;gt;wiki-task&amp;lt;/code&amp;gt; container, which handles all back-end jobs and processes. You can connect into the container in two different ways:&lt;br /&gt;
&lt;br /&gt;
* run &amp;lt;code&amp;gt;./bluespice-deploy exec -it wiki-task bash&amp;lt;/code&amp;gt; in the &amp;lt;code&amp;gt;compose&amp;lt;/code&amp;gt; directory for Docker Compose files&lt;br /&gt;
* or alternatively, run &amp;lt;code&amp;gt;docker exec -it bluespice-wiki-task bash&amp;lt;/code&amp;gt; wherever you are on the host machine&lt;br /&gt;
&lt;br /&gt;
Inside the container you can enter the wiki&#039;s code base with &amp;lt;code&amp;gt;cd /app/bluespice/w&amp;lt;/code&amp;gt; , where one can run scripts like &amp;lt;code&amp;gt;php maintenance/run.php update --quick&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;php extensions/BlueSpiceExtendedSearch/maintenance/updateWikiPageIndex.php&amp;lt;/code&amp;gt; and so on.&lt;br /&gt;
&lt;br /&gt;
=== SSL certificates ===&lt;br /&gt;
To use a Let&#039;s Encrypt certificate for your domain name, set &amp;lt;code&amp;gt;LETSENCRYPT=true&amp;lt;/code&amp;gt; in your &amp;lt;code&amp;gt;.env&amp;lt;/code&amp;gt; file.&lt;br /&gt;
&lt;br /&gt;
To use a self-signend certificate for your domain name, put its &amp;lt;code&amp;gt;.crt&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;.key&amp;lt;/code&amp;gt; files in &amp;lt;code&amp;gt;${DATADIR}/proxy/certs&amp;lt;/code&amp;gt;. For example, with &amp;lt;code&amp;gt;wiki.company.local&amp;lt;/code&amp;gt; you should prepare &amp;lt;code&amp;gt;wiki.company.local.crt&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;wiki.company.local.key&amp;lt;/code&amp;gt; files.&lt;br /&gt;
&lt;br /&gt;
=== Kerberos proxy ===&lt;br /&gt;
For implicit authentication using Kerberos, an additional proxy must be used: &amp;lt;code&amp;gt;bluespice/kerberos-proxy&amp;lt;/code&amp;gt; . The file &amp;lt;code&amp;gt;docker-compose.kerberos-proxy.yml&amp;lt;/code&amp;gt; contains a common configuration. It can be used &#039;&#039;&#039;instead of&#039;&#039;&#039; the regular &amp;lt;code&amp;gt;docker-compose.proxy.yml&amp;lt;/code&amp;gt; file inside &amp;lt;code&amp;gt;bluespice-deploy&amp;lt;/code&amp;gt; .&lt;br /&gt;
&lt;br /&gt;
Make sure to have the files&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;code&amp;gt;${DATADIR}/kerberos/krb5.conf&amp;lt;/code&amp;gt;&lt;br /&gt;
* &amp;lt;code&amp;gt;${DATADIR}/kerberos/kerberos.keytab&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
set up properly.&lt;br /&gt;
&lt;br /&gt;
The file &amp;lt;code&amp;gt;${DATADIR}/wiki/bluespice/pre-init-settings.php&amp;lt;/code&amp;gt; can then be used to set up [[mediawikiwiki:LDAP_hub|&amp;quot;Extension:Auth_remoteuser&amp;quot; and the LDAP stack extensions]].&lt;br /&gt;
&lt;br /&gt;
=== SAML authentication ===&lt;br /&gt;
During the initial installation a certificate for message signing will automatically be created. It can be found in &amp;lt;code&amp;gt;${DATADIR}/wiki/simplesamlphp/certs/&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
In order to configure a remote IdP, one must copy the IdP metadata XML to a file called &amp;lt;code&amp;gt;${DATADIR}/wiki/simplesamlphp/saml_idp_metadata.xml&amp;lt;/code&amp;gt;. The SP metadata can then be obtained via &amp;lt;code&amp;gt;&amp;lt;nowiki&amp;gt;https://{{$WIKI_HOST}}/_sp/module.php/saml/sp/metadata.php/default-sp&amp;lt;/nowiki&amp;gt;&amp;lt;/code&amp;gt;. It must be configured in the remote IdP.&lt;br /&gt;
&lt;br /&gt;
{{Textbox&lt;br /&gt;
|boxtype=tip&lt;br /&gt;
|header=Test authentication&lt;br /&gt;
|text= You can test authentication directly within the SimpleSAMLphp application. To do so, navigate to &amp;lt;code&amp;gt;&amp;lt;nowiki&amp;gt;https://{{$WIKI_HOST}}/_sp/module.php/admin&amp;lt;/nowiki&amp;gt;&amp;lt;/code&amp;gt; and log in with &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; and the &amp;lt;code&amp;gt;INTERNAL_SIMPLESAMLPHP_ADMIN_PASS&amp;lt;/code&amp;gt; found in &amp;lt;code&amp;gt;${DATADIR}/wiki/.wikienv&amp;lt;/code&amp;gt;&lt;br /&gt;
|icon=yes&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
Next, the extensions &amp;quot;PluggableAuth&amp;quot; and &amp;quot;SimpleSAMLphp&amp;quot; must be enabled on the wiki. To do so, add&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;php&amp;quot;&amp;gt;&lt;br /&gt;
wfLoadExtensions( [&lt;br /&gt;
    &#039;PluggableAuth&#039;,&lt;br /&gt;
    &#039;SimpleSAMLphp&#039;&lt;br /&gt;
] );&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;[[File:Setup:SAML ConfigManager EN 01.png|thumb|300x300px]]to the &amp;lt;code&amp;gt;${DATADIR}/wiki/bluespice/post-init-settings.php&amp;lt;/code&amp;gt;. Run&lt;br /&gt;
&lt;br /&gt;
 ./bluespice-deploy exec wiki-task /app/bluespice/w/maintenance/update.php --quick&lt;br /&gt;
&lt;br /&gt;
to complete the installation.&lt;br /&gt;
&lt;br /&gt;
After that, the authentication plugin configuration can be applied in [[Manual:Extension/BlueSpiceConfigManager|Special:BlueSpiceConfigManager]] under &amp;quot;Authentication&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== OpenID Connect authentication ===&lt;br /&gt;
&lt;br /&gt;
The extensions &amp;quot;PluggableAuth&amp;quot; and &amp;quot;OpenIDConnect&amp;quot; must be enabled on the wiki. To do so, add&amp;lt;syntaxhighlight lang=&amp;quot;php&amp;quot;&amp;gt;&lt;br /&gt;
wfLoadExtensions( [&lt;br /&gt;
    &#039;PluggableAuth&#039;,&lt;br /&gt;
    &#039;OpenIDConnect&#039;&lt;br /&gt;
] );&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;to the &amp;lt;code&amp;gt;${DATADIR}/wiki/bluespice/post-init-settings.php&amp;lt;/code&amp;gt;. Run&lt;br /&gt;
&lt;br /&gt;
 ./bluespice-deploy exec wiki-task /app/bluespice/w/maintenance/update.php --quick&lt;br /&gt;
&lt;br /&gt;
to complete the installation.&lt;br /&gt;
&lt;br /&gt;
After that, the authentication plugin configuration can be applied in [[Manual:Extension/BlueSpiceConfigManager|Special:BlueSpiceConfigManager]] under &amp;quot;Authentication&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
[[de:Setup:Installationsanleitung/Docker]]&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories&amp;diff=13651</id>
		<title>Security:Security Advisories</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories&amp;diff=13651"/>
		<updated>2025-12-08T15:43:40Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;width:100%;&amp;quot;&lt;br /&gt;
! style=&amp;quot;&amp;quot; |Release name&lt;br /&gt;
! style=&amp;quot;&amp;quot; |Release date&lt;br /&gt;
! style=&amp;quot;&amp;quot; |Title&lt;br /&gt;
! style=&amp;quot;&amp;quot; |References&lt;br /&gt;
! style=&amp;quot;&amp;quot; |Summary&lt;br /&gt;
!Severity&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2025-06|BSSA-2025-06]]&lt;br /&gt;
|2025-10-28&lt;br /&gt;
|Security vulnerabilities in various MediaWiki extensions that are actually part of the BlueSpice distribution&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2024-56171 CVE-2024-56171], [https://www.cve.org/CVERecord?id=CVE-2025-3277 CVE-2025-3277], [https://www.cve.org/CVERecord?id=CVE-2025-6965 CVE-2025-6965], [https://www.cve.org/CVERecord?id=CVE-2025-11173 CVE-2025-11173], [https://www.cve.org/CVERecord?id=CVE-2025-11175 CVE-2025-11175],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-53625 CVE-2025-53625],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-54370 CVE-2025-54370],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-54874 CVE-2025-54874],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-59839 CVE-2025-59839],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61634 CVE-2025-61634],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61635 CVE-2025-61635],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61636 CVE-2025-61636],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61637 CVE-2025-61637],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61638 CVE-2025-61638],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61639 CVE-2025-61639],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61640 CVE-2025-61640],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61641 CVE-2025-61641],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61642 CVE-2025-61642],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61643 CVE-2025-61643],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61646 CVE-2025-61646],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61652 CVE-2025-61652],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61653 CVE-2025-61653],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61655 CVE-2025-61655],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61655 CVE-2025-61655],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61656 CVE-2025-61656],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61656 CVE-2025-61656],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-61657 CVE-2025-61657],&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-7458 CVE-2025-7458]&lt;br /&gt;
|Denial Of Service,&lt;br /&gt;
Cross-Site Scripting (XSS),&lt;br /&gt;
Information Disclosure,&lt;br /&gt;
Bypass authn at content check,&lt;br /&gt;
Server-side Request Forgery,&lt;br /&gt;
Arbitrary Code Execution,&lt;br /&gt;
Memory Corruption,&lt;br /&gt;
Use-After-Free,&lt;br /&gt;
Arbitrary SQL Execution&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-red-bg&amp;quot; |High&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2025-05|BSSA-2025-05]]&lt;br /&gt;
|2025-09-19&lt;br /&gt;
|XSS in Extension:AtMentions, Extension:BlueSpiceAvatars, Extension:BlueSpiceWhoIsOnline and Extension:CognitiveProcessDesigner&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2025-46703 CVE-2025-46703], [https://www.cve.org/CVERecord?id=CVE-2025-48007 CVE-2025-48007], [https://www.cve.org/CVERecord?id=CVE-2025-57880 CVE-2025-57880], [https://www.cve.org/CVERecord?id=CVE-2025-58114 CVE-2025-58114]&lt;br /&gt;
|&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-orange-bg&amp;quot; |Medium&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2025-04|BSSA-2025-04]]&lt;br /&gt;
|2025-09-18&lt;br /&gt;
|Security vulnerabilities in services &amp;lt;code&amp;gt;bluespice/search&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;bluespice/formular&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;bluespice/wiki&amp;lt;/code&amp;gt; &lt;br /&gt;
|[https://nvd.nist.gov/vuln/detail/CVE-2025-54988 CVE-2025-54988], [https://avd.aquasec.com/nvd/2025/cve-2025-7783 CVE-2025-7783], [https://avd.aquasec.com/nvd/cve-2025-58050 CVE-2025-58050], [https://avd.aquasec.com/nvd/cve-2025-49794 CVE-2025-49794], [https://avd.aquasec.com/nvd/cve-2025-49796 CVE-2025-49796]&lt;br /&gt;
|Denial-of-Service, Information Disclosure&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |Low&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2025-03|BSSA-2025-03]]&lt;br /&gt;
|2025-07-28&lt;br /&gt;
|Security vulnerabilities in Extension:Scribunto, Extension:TabberNeue, Extension:TwoColConflict and Extension:Quiz&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2025-53501 CVE-2025-53501], [https://www.cve.org/CVERecord?id=CVE-2025-53494 CVE-2025-53494], [https://www.cve.org/CVERecord?id=CVE-2025-53093 CVE-2025-53093], [https://www.cve.org/CVERecord?id=CVE-2025-7057 CVE-2025-7057]&lt;br /&gt;
|Information Disclosure, &lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-orange-bg&amp;quot; |Medium&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2025-02|BSSA-2025-02]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2025-04-17&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Security vulnerabilities in Extension:OAuth&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2025-32068 CVE-2025-32068], [https://www.cve.org/CVERecord?id=CVE-2025-32074 CVE-2025-32074]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Allows unauthorized access to the wiki, Cross-Site Scripting (XSS)&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-orange-bg&amp;quot; |Medium&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2025-01|BSSA-2025-01]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2025-01-20&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Security vulnerabilities in Extension:DataTransfer &lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2025-23081 CVE-2025-23081]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Allows Cross Site Request Forgery, Cross-Site Scripting (XSS)&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-orange-bg&amp;quot; |Medium&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2023-02|BSSA-2023-02]]&lt;br /&gt;
|2023-10-30&lt;br /&gt;
|Security vulnerabilities in Extension:BlueSpiceAvatars&lt;br /&gt;
|[https://www.cve.org/cverecord?id=CVE-2023-42431 CVE-2023-42431]&lt;br /&gt;
|Allows Cross-Site Scripting (XSS)&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |Low&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2023-01|BSSA-2023-01]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2023-07-25&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Ghostscript vulnerability&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2023-36664 CVE-2023-36664]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Code can be executed on the server via a manipulated PDF&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-orange-bg&amp;quot; |Medium&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-08|BSSA-2022-08]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-3895 CVE-2022-3895]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through use of interface elements&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-orange-bg&amp;quot; |Medium&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-07|BSSA-2022-07]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-3958 CVE-2022-3958]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through personal menu items&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-orange-bg&amp;quot; |Medium&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-06|BSSA-2022-06]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-3893 CVE-2022-3893]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through the custom menu&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |Low&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-05|BSSA-2022-05]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-42001 CVE-2022-42001]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through the book navigation&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |Low&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-04|BSSA-2022-04]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-41789 CVE-2022-41789], [https://www.cve.org/CVERecord?id=CVE-2022-41814 CVE-2022-41814], [https://www.cve.org/CVERecord?id=CVE-2022-42000 CVE-2022-42000]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through user preferences&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |Low&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-03|BSSA-2022-03]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-41611 CVE-2022-41611]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through main navigation&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |Low&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-02|BSSA-2022-02]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-2511 CVE-2022-2511]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through the &#039;title&#039; parameter&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-orange-bg&amp;quot; |Medium&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-01|BSSA-2022-01]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-01-31&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector in Search Center&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-2510 CVE-2022-2510]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |JavaScript in search field is reflected back to the browser.&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-orange-bg&amp;quot; |Medium&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-04&amp;diff=13650</id>
		<title>Security:Security Advisories/BSSA-2025-04</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-04&amp;diff=13650"/>
		<updated>2025-12-08T15:42:09Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2025-09-18&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|reported &amp;quot;critical&amp;quot;, BlueSpice assessment: &#039;&#039;&#039;low&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
| Services in current LTS version 5.1&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|fix not yet available&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
| [https://nvd.nist.gov/vuln/detail/CVE-2025-54988 CVE-2025-54988], [https://avd.aquasec.com/nvd/2025/cve-2025-7783 CVE-2025-7783], [https://avd.aquasec.com/nvd/cve-2025-58050 CVE-2025-58050], [https://avd.aquasec.com/nvd/cve-2025-49794 CVE-2025-49794], [https://avd.aquasec.com/nvd/cve-2025-49796 CVE-2025-49796]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Problem==&lt;br /&gt;
&lt;br /&gt;
* Service &amp;lt;code&amp;gt;bluespice/search&amp;lt;/code&amp;gt;- [https://nvd.nist.gov/vuln/detail/CVE-2025-54988 CVE-2025-54988]&lt;br /&gt;
* Service &amp;lt;code&amp;gt;bluespice/formula&amp;lt;/code&amp;gt; - [https://avd.aquasec.com/nvd/2025/cve-2025-7783/ CVE-2025-7783/]&lt;br /&gt;
* Service &amp;lt;code&amp;gt;bluespice/wiki&amp;lt;/code&amp;gt;&lt;br /&gt;
** PCRE: [https://avd.aquasec.com/nvd/cve-2025-58050 CVE-2025-58050]&lt;br /&gt;
** libxml: [https://avd.aquasec.com/nvd/cve-2025-49794 CVE-2025-49794] and [https://avd.aquasec.com/nvd/cve-2025-49796 CVE-2025-49796]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Impact assessment==&lt;br /&gt;
&lt;br /&gt;
* Service &amp;lt;code&amp;gt;bluespice/search&amp;lt;/code&amp;gt;&lt;br /&gt;
** The issues has already been fixed in the upstream repository, but there was no official release yet&lt;br /&gt;
** A manipulated PDF file needs to be uploaded to the wiki, which usually requires an authenticated user context. The service runs only in the background and can not be accessed from outside the virtual network. It has limited access to the host system.&lt;br /&gt;
* Service &amp;lt;code&amp;gt;bluespice/formula&amp;lt;/code&amp;gt;&lt;br /&gt;
** Caused by a dependency of [https://www.npmjs.com/package/coveralls coveralls]&lt;br /&gt;
** Not used production code&lt;br /&gt;
* Service &amp;lt;code&amp;gt;bluespice/wiki&amp;lt;/code&amp;gt;&lt;br /&gt;
** No direct usage of those libraries&lt;br /&gt;
** Only accessed via PHP&lt;br /&gt;
** Main impacts are potential information disclose and denial-of-service&lt;br /&gt;
*** No critical information can be disclosed&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
To mitigate &amp;lt;code&amp;gt;CVE-2025-54988&amp;lt;/code&amp;gt; one can make sure the service has no access to the internet.&lt;br /&gt;
&lt;br /&gt;
Besides this, there is currently no solution to those issues. Once the upstream vendors release fixed packages, the next patchlevel release of BlueSpice will contain them.&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=MediaWiki:Common.css&amp;diff=13332</id>
		<title>MediaWiki:Common.css</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=MediaWiki:Common.css&amp;diff=13332"/>
		<updated>2025-11-19T10:19:58Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;/* Das folgende CSS wird für alle Benutzeroberflächen geladen. */&lt;br /&gt;
/*WCAG 1.4.3 discernable links*/&lt;br /&gt;
.mw-body-content a:not([class*=&#039;oo-ui-&#039;]), [class^=&#039;mw-content-&#039;] a:not([class*=&#039;oo-ui-&#039;]) {text-decoration:underline dotted; text-underline-offset:4px;text-decoration-thickness: 1px; text-decoration-color:grey}&lt;br /&gt;
/* BS5 */&lt;br /&gt;
/*Softwarekatalog*/&lt;br /&gt;
 table.casablanca.swc tbody tr, table.casablanca.swc th {&lt;br /&gt;
    color:#333&lt;br /&gt;
}&lt;br /&gt;
 table.casablanca.swc thead tr, table.casablanca tbody th.swc {&lt;br /&gt;
    background:#e9e9ee&lt;br /&gt;
}&lt;br /&gt;
a.pdfcreator-export {&lt;br /&gt;
    background: #efefef;&lt;br /&gt;
    padding: 10px;&lt;br /&gt;
    border-radius: 6px;&lt;br /&gt;
    float: right;&lt;br /&gt;
    font-weight: bold;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
a.pdfcreator-export:before {&lt;br /&gt;
    font-family: &#039;bootstrap-icons&#039;;&lt;br /&gt;
    content: &#039;\F1B9&#039;;&lt;br /&gt;
    vertical-align: -0.3em;&lt;br /&gt;
    padding-right: 0.5em;&lt;br /&gt;
}&lt;br /&gt;
/*move hf-footer closer to the bottom of the page by adjusting necessary margins */&lt;br /&gt;
#main {padding-bottom:1em;}&lt;br /&gt;
/*ordered lists */&lt;br /&gt;
article ol ol {list-style-type: lower-alpha;}&lt;br /&gt;
.hf-nsfooter {margin-top:3em;}&lt;br /&gt;
.thumbborder {border:1px solid #d3d5da}&lt;br /&gt;
&lt;br /&gt;
/*TOC&lt;br /&gt;
#content .toc {width:100%; background:#f1f3f9; font-size:1em}&lt;br /&gt;
#content .toc li {padding:3px;}&lt;br /&gt;
#content .toc  li:hover {background:white; outline-bottom:1px solid #f1f3f9; }&lt;br /&gt;
#content .toctitle {text-align:left; border-bottom:2px solid #fff; padding:2px}&lt;br /&gt;
*/&lt;br /&gt;
/*external Video thumbs*/&lt;br /&gt;
.youtubelink div.thumbinner {&lt;br /&gt;
    border: 1px solid #d5d5d5;&lt;br /&gt;
    background-color: #f1f3f9;&lt;br /&gt;
    border-radius:8px;&lt;br /&gt;
    -webkit-box-shadow: 3px 3px 3px 0px rgba(207,207,207,1);&lt;br /&gt;
    -moz-box-shadow: 3px 3px 3px 0px rgba(207,207,207,1);&lt;br /&gt;
    box-shadow: 3px 3px 3px 0px rgba(207,207,207,1);}&lt;br /&gt;
.youtubelink .thumbcaption {font-weight:bold; margin-top:8px}&lt;br /&gt;
.youtubelink a.external    {padding-top: 2px;&lt;br /&gt;
    display: inline-block;}&lt;br /&gt;
    &lt;br /&gt;
a.external, .link-mailto, .link-ftp, .link-irc, .link-audio, .link-video, .link-document {&lt;br /&gt;
    padding-right: 13px!important}&lt;br /&gt;
    &lt;br /&gt;
figcaption  a {&lt;br /&gt;
    padding-left: 0!important;}&lt;br /&gt;
/*Standard content table bg color */&lt;br /&gt;
table.contenttable thead tr, table.contenttable th {background-color: #e9e9ee; vertical-align:top}&lt;br /&gt;
table.contenttable td {vertical-align:top}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
/*pdf noexport without highlighting*/&lt;br /&gt;
.bs-universalexport-exportexclude {&lt;br /&gt;
    background-color:transparent;&lt;br /&gt;
    border:none;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
/*Discussions and attachments currently not in use in the helpdesk, therfore hiding for no */&lt;br /&gt;
.icon-bluespice-logo:before {&lt;br /&gt;
    font-family: &#039;icomoon&#039; !important;&lt;br /&gt;
    content: &amp;quot;\e910&amp;quot;;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
/*hide spans from templates in TOC text&lt;br /&gt;
.toctext span {display:none!important}*/&lt;br /&gt;
&lt;br /&gt;
/* bootstrap icons in blue and big */&lt;br /&gt;
.bi-big, .fa-big { font-size: 2rem;&lt;br /&gt;
    color: #2b80ea;&lt;br /&gt;
	&lt;br /&gt;
} &lt;br /&gt;
&lt;br /&gt;
/*images in a list*/&lt;br /&gt;
#content li figure, #content li .floatnone, #content li  img:first-child, #content li .thumb, content li .thumb img:first-child &lt;br /&gt;
{&lt;br /&gt;
    margin-top:1.5em; margin-bottom:1.5em; &lt;br /&gt;
}&lt;br /&gt;
#content li.ve-ce-branchNode .thumb img:first-child, #content li.ve-ce-branchNode figure img:first-child, #content li.ve-ce-branchNode img.ve-ce-chimera {&lt;br /&gt;
    margin-top:0; &lt;br /&gt;
}&lt;br /&gt;
#content li .thumb {&lt;br /&gt;
    margin-bottom:0&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#data-after-content {display: none;}&lt;br /&gt;
.wikitable &amp;gt; tr &amp;gt; th, .wikitable &amp;gt; tr &amp;gt; td, .wikitable &amp;gt; * &amp;gt; tr &amp;gt; th, .wikitable &amp;gt; * &amp;gt; tr &amp;gt; td {padding: 0.8em 0.4em;}&lt;br /&gt;
&lt;br /&gt;
span.newicon {&lt;br /&gt;
    vertical-align: super;&lt;br /&gt;
    background: #64b334;&lt;br /&gt;
    margin-left: 3px;&lt;br /&gt;
    font-size: 0.8em;&lt;br /&gt;
    padding: 1px 4px 2px 4px;&lt;br /&gt;
    border-radius: 50%;&lt;br /&gt;
    color: #ffffff;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
.flexbox{display:flex;flex-direction:row;flex-wrap:wrap;justify-content:flex-start;align-items:stretch;align-content:stretch;}&lt;br /&gt;
.flexbox div{margin:5px;padding:2px 8px;text-align:center;background:#ececec}&lt;br /&gt;
.center &amp;gt; div.thumb {margin-top:2em}&lt;br /&gt;
#content .toctitle h2 {margin-right: 1em; display: inline;font-size: 1.4rem;}&lt;br /&gt;
.qtip {font-size: 1em;line-height: 1.4em;}&lt;br /&gt;
&lt;br /&gt;
/*Related links */&lt;br /&gt;
h2#relatedinfo&lt;br /&gt;
{border-left: solid 4px #d8d8d9;&lt;br /&gt;
background:#f1f3f9;&lt;br /&gt;
color: #868585;&lt;br /&gt;
margin-top: 3rem;&lt;br /&gt;
margin-bottom:0 !important;&lt;br /&gt;
padding: 20px 10px 2px 30px;&lt;br /&gt;
}&lt;br /&gt;
.relatedtopics {&lt;br /&gt;
display:flex;&lt;br /&gt;
flex-wrap: wrap;&lt;br /&gt;
border-left: solid 4px #d8d8d9;&lt;br /&gt;
background:#f1f3f9;&lt;br /&gt;
padding: 2em !important;&lt;br /&gt;
margin:0  !important;&lt;br /&gt;
}&lt;br /&gt;
.relatedtopics .col{flex-basis: 50%; flex-grow: 1; flex-shrink: 1;}&lt;br /&gt;
&lt;br /&gt;
/*Themen*/&lt;br /&gt;
.flexbox.themenhd div {background:#fff; border:1px solid #d8d8d9; padding:10px 20px; flex-basis:24%; text-align:left}&lt;br /&gt;
.flexbox.themenhd div [class*=&amp;quot; bi-&amp;quot;]::before {font-size: 1.6em; vertical-align: middle;background-color: #fff; padding: 6px; border-radius: 50%;}&lt;br /&gt;
.flexbox.themenhd  div [class*=&amp;quot; bi-&amp;quot;]::before {font-size:2em; vertical-align:middle; background-color:#f1f3f9; padding: 10px; }&lt;br /&gt;
.themenhd div a {display:block}&lt;br /&gt;
.themenhd div:hover {background:rgb(233,233,238,0.5)}&lt;br /&gt;
ul.smw-format.ul-format.alltopics-col {column-count: 3;}&lt;br /&gt;
&lt;br /&gt;
/*Tours */&lt;br /&gt;
.nextstep {display: inline-block;padding: 6px;background: #36c;border-radius: 2px;color: #ffffff;font-weight: bold;}&lt;br /&gt;
#mw-content-text .nextstep a:not(.new), [class^=&amp;quot;mw-content-&amp;quot;] .nextstep a:not(.new), #mw-content-text .nextstep a:link:not(.new), [class^=&amp;quot;mw-content-&amp;quot;] .nextstep a:link:not(.new) {&lt;br /&gt;
    color: #ffffff;    font-weight: bold;}&lt;br /&gt;
#mw-content-text .nextstep a:not(.new):hover, #mw-content-text .nextstep a:link:not(.new):hover, [class^=&amp;quot;mw-content-&amp;quot;] .nextstep a:link:not(.new):hover {&lt;br /&gt;
    color: #efefef;}&lt;br /&gt;
.nextstep a:not(.new)::after, .nextstep a:link:not(.new)::after {content: &amp;quot; \25B6&amp;quot;;}&lt;br /&gt;
&lt;br /&gt;
/*Main page*/&lt;br /&gt;
.flexbox-portal div &amp;gt; h2 span::before {vertical-align: text-bottom; size:1.1em;}&lt;br /&gt;
.mw-parser-output .flexbox-portal.col3 &amp;gt; div:nth-child(3n) {margin-right:0 !important}&lt;br /&gt;
#maintopics ul {list-style: none!important;}&lt;br /&gt;
#maintopics li {padding-bottom:0.6em!important;margin-left: 12px!important;}&lt;br /&gt;
#mpbanner {margin-top:-55px; background:#fff url(/w/nsfr_img_auth.php/f/fa/BlueSpice-Demo_Header.jpg) -90px no-repeat; background-size: 1000px 122px;}&lt;br /&gt;
h1#mpbanner-byline {font-size:1.8em; color:#3e5389;line-height: 1em; padding-top: 20px;}&lt;br /&gt;
#mpbanner-title {font-size:3.4rem; color:#3e5389; line-height:1.2em; font-weight: 900;letter-spacing: 1px; display:block}&lt;br /&gt;
#maintopics h2 span::before {vertical-align: text-bottom;padding-bottom: 2px;}&lt;br /&gt;
&lt;br /&gt;
/** Template downloads **/&lt;br /&gt;
.cards {display:flex; flex-wrap:wrap;  justify-content: space-between; gap:20px}&lt;br /&gt;
.cards &amp;gt; div {margin-left:5px; margin-right:5px; flex-basis:290px; margin-bottom:50px; border-top: 1px solid #f0f0f0; box-shadow: 0 1px 3px rgba(0,0,0,.12),0 1px 2px rgba(0,0,0,.24);&lt;br /&gt;
    transition: all .3s cubic-bezier(.25,.8,.25,1); cursor: pointer; text-align:center}&lt;br /&gt;
.cards &amp;gt; div:hover {&lt;br /&gt;
    box-shadow: 0 6px 8px rgba(0,0,0,.10),0 10px 10px rgba(0,0,0,.10);&lt;br /&gt;
}&lt;br /&gt;
.cards a.image img {max-width:600px}&lt;br /&gt;
.cards .screenshot {width:300px;height:200px; overflow:hidden; border-top:14px solid #eee; border-bottom:14px solid #eee}&lt;br /&gt;
#content #bodyContent .cards h2 {margin:10px; padding:0; font-size:1.1rem; font-color:#444; border:none; text-align:center}&lt;br /&gt;
.cards h2 .mw-editsection {display:none}&lt;br /&gt;
.cards .text {font-size:0.85rem; padding:20px 10px; text-align:center; font-weight:bold;}&lt;br /&gt;
#mw-content-text text a:not(.new), [class^=&amp;quot;mw-content-&amp;quot;] .text a:not(.new), #mw-content-text .text a:link:not(.new), [class^=&amp;quot;mw-content-&amp;quot;] .text a:link:not(.new), #mw-content-text .text a:not(.new):visited, [class^=&amp;quot;mw-content-&amp;quot;] .text a:not(.new):visited, #mw-content-text .text a:link:not(.new):visited, [class^=&amp;quot;mw-content-&amp;quot;] .text a:link:not(.new):visited &lt;br /&gt;
{color:#444;}&lt;br /&gt;
.cards .emptycard, .cards &amp;gt; div.emptycard:hover &lt;br /&gt;
{border: 0;&lt;br /&gt;
box-shadow: none;}&lt;br /&gt;
@media only screen and (max-width: 768px)&lt;br /&gt;
{.cards &amp;gt; div {flex-basis:98%; }&lt;br /&gt;
.cards .screenshot {width:auto; text-align:center}	&lt;br /&gt;
	&lt;br /&gt;
}&lt;br /&gt;
.getButton {&lt;br /&gt;
    display: inline-block;&lt;br /&gt;
    background-color: #4CAF50;&lt;br /&gt;
    border: none;&lt;br /&gt;
    color: white;&lt;br /&gt;
    padding: 8px 20px;&lt;br /&gt;
    text-align: center;&lt;br /&gt;
    text-decoration: none;&lt;br /&gt;
    font-size: 16px;&lt;br /&gt;
    margin: 0 0 10px 0;&lt;br /&gt;
    -webkit-transition-duration: 0.4s;&lt;br /&gt;
    transition-duration: 0.4s;&lt;br /&gt;
    border-radius: 8px;}&lt;br /&gt;
&lt;br /&gt;
#mw-content-text .getButton a&lt;br /&gt;
{color:#ffffff!important;}&lt;br /&gt;
.getButton:hover {&lt;br /&gt;
box-shadow: 0 12px 16px 0 rgba(0,0,0,0.24),0 17px 50px 0 rgba(0,0,0,0.19);&lt;br /&gt;
color:&#039;f5f5f5&#039;;&lt;br /&gt;
}&lt;br /&gt;
.getButton:active {&lt;br /&gt;
	position:relative;&lt;br /&gt;
	top:1px;&lt;br /&gt;
}&lt;br /&gt;
.getButton a:before {font-family: &#039;fontawesome&#039;;&lt;br /&gt;
content: &#039;\f019 &#039;;&lt;br /&gt;
font-size: 1.3em;&lt;br /&gt;
vertical-align: middle;&lt;br /&gt;
margin-right: 10px;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
.cart a:before {font-family: &#039;fontawesome&#039;;&lt;br /&gt;
content: &#039;\f217 &#039;;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
.downloadarea {&lt;br /&gt;
text-align:center;&lt;br /&gt;
display: inline-block;&lt;br /&gt;
float: right;&lt;br /&gt;
margin: 0 0 20px 40px;&lt;br /&gt;
padding: 10px;&lt;br /&gt;
background: #efefef;&lt;br /&gt;
background: linear-gradient(270deg, rgb(240, 240, 240) 0%, rgb(224, 224, 224) 52%, rgb(240, 240, 240) 100%);&lt;br /&gt;
}&lt;br /&gt;
.downloadarea p {margin:0}&lt;br /&gt;
@media only screen and (max-width: 768px)&lt;br /&gt;
{.cards &amp;gt; div {flex-basis:98%; }&lt;br /&gt;
}&lt;br /&gt;
.oo-ui-panelLayout-framed {border: 0;}&lt;br /&gt;
.oo-ui-tabSelectWidget-framed {border-bottom: 1px solid #d3d5da;}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
/*HP Aktuelles */&lt;br /&gt;
#aktuelles {background: rgba(201, 224, 143, .3); padding:10px; margin:20px 0}&lt;br /&gt;
#aktuelles h2::before {font-family:&#039;fontawesome&#039;; font-size:0.8em; content:&#039;\f02e&#039;; color: #64b334; margin-right:10px}&lt;br /&gt;
#aktuelles h2 {margin: 8px 0 8px 24px; color: #454545; font-size: 1.4em; border-bottom: none; }&lt;br /&gt;
#aktuelles table {margin: 0 8px 15px 37px}&lt;br /&gt;
#aktuelles td {padding:3px 10px}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
table.padded td, table.padded th {padding:8px}&lt;br /&gt;
&lt;br /&gt;
/*Fixed table header */&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
.scrolltable table.jquery-tablesorter th.headerSort {background-position: 20px 112px;}&lt;br /&gt;
&lt;br /&gt;
.table-scroll{&lt;br /&gt;
  /*width:100%; */&lt;br /&gt;
  display: block;&lt;br /&gt;
  empty-cells: show;&lt;br /&gt;
  &lt;br /&gt;
  /* Decoration */&lt;br /&gt;
  border-spacing: 0;&lt;br /&gt;
  border: 1px solid;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
.table-scroll thead{&lt;br /&gt;
  background-color: #f1f1f1;  &lt;br /&gt;
  position:relative;&lt;br /&gt;
  display: block;&lt;br /&gt;
  width:100%;&lt;br /&gt;
  overflow-y: scroll;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
.table-scroll tbody{&lt;br /&gt;
  /* Position */&lt;br /&gt;
  display: block; position:relative;&lt;br /&gt;
  width:100%; overflow-y:scroll;&lt;br /&gt;
  /* Decoration */&lt;br /&gt;
  border-top: 1px solid rgba(0,0,0,0.2);&lt;br /&gt;
   max-height: 50vh;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
.table-scroll tr{&lt;br /&gt;
  width: 100%;&lt;br /&gt;
  display:flex;&lt;br /&gt;
}&lt;br /&gt;
.table-scroll th{&lt;br /&gt;
 writing-mode:vertical-lr;&lt;br /&gt;
 font-weight:normal;&lt;br /&gt;
}&lt;br /&gt;
.table-scroll td,.table-scroll th{&lt;br /&gt;
flex-grow: 2;&lt;br /&gt;
display: block;&lt;br /&gt;
padding: 5px;&lt;br /&gt;
text-align: right;&lt;br /&gt;
border-right: 1px solid #ccc;&lt;br /&gt;
width:60px&lt;br /&gt;
}&lt;br /&gt;
.table-scroll td {text-align: center;}&lt;br /&gt;
.table-scroll th {text-align: right;}&lt;br /&gt;
/* Other options */&lt;br /&gt;
&lt;br /&gt;
.table-scroll td:first-child,&lt;br /&gt;
.table-scroll th:first-child{&lt;br /&gt;
  flex-basis:200px;&lt;br /&gt;
  flex-grow:0;&lt;br /&gt;
  text-align:left;&lt;br /&gt;
  writing-mode: unset;&lt;br /&gt;
}&lt;br /&gt;
.widefirst td:first-child,.widefirst th:first-child{  flex-basis:500px;}&lt;br /&gt;
&lt;br /&gt;
.table-scroll tbody tr:nth-child(2n){&lt;br /&gt;
  background-color: rgba(130,130,170,0.1);&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
/*Feature-Boxen auf HP */&lt;br /&gt;
.sectionflex .featurebox {padding:0!important}&lt;br /&gt;
#mw-content-text .sectionflex .featurebox h2 {border:0; margin-bottom:0!important}&lt;br /&gt;
.featurebox a {color:#444 !important;display:block; padding:4px}&lt;br /&gt;
.featurebox a:hover {text-decoration:none !important}&lt;br /&gt;
.featurebox:focus, .featurebox:hover {background:#fafafa; border: 1px solid #d4d4da!important}&lt;br /&gt;
#bodyContent .featurebox .sectionanchors-button {display:none !important}&lt;br /&gt;
.featurebox span[class*=fas] {margin-bottom:0.5em}&lt;br /&gt;
.featurebox .mw-headline-number {display:none}&lt;br /&gt;
&lt;br /&gt;
/*Quiz*/&lt;br /&gt;
.quiz .question{margin-bottom:3em;}&lt;br /&gt;
.questionText{font-weight:700;margin-bottom:1.2em;}&lt;br /&gt;
.question .header{background:#fff0e1;padding:1px 6px;}&lt;br /&gt;
span.questionText{display:block;}&lt;br /&gt;
.question td{background:#f6f6f6;border-bottom:2px solid #fff;padding:8px 6px 6px;}&lt;br /&gt;
.question th{background:#f6f6f6;border-bottom:2px solid #fff;padding:8px 6px 6px;}&lt;br /&gt;
.quiz table{width:100%;}&lt;br /&gt;
.quizQuestions .question .sign{width:26px;}&lt;br /&gt;
.quiz table.settings{margin-left:30px!important;}&lt;br /&gt;
.mw-content-ltr .quiz .question .border{border-width:0 0 0 12px !important;}&lt;br /&gt;
.quiz .margin.right{background-color:#8ed27d!important;}&lt;br /&gt;
.quiz .margin.NA{background-color:#337ecc!important;}&lt;br /&gt;
.quiz .margin.wrong{background-color:#ff5c64!important;}&lt;br /&gt;
.quiz .question .border.right{border-color:#8ed27d!important;}&lt;br /&gt;
.quiz .question .border.NA{border-color:#337ecc!important;}&lt;br /&gt;
.quiz .question .border.wrong{border-color:#ff5c64!important;}&lt;br /&gt;
.quiz .question .check.right{outline:3px solid #8ed27d!important;}&lt;br /&gt;
.quiz .question .check.NA{outline:3px solid #337ecc!important;}&lt;br /&gt;
.quiz .question .check.wrong{outline:3px solid #ff5c64!important;}&lt;br /&gt;
.quizForm input[value=&amp;quot;Submit&amp;quot;]{background:#36c;border:none;color:#FFF;margin-right:10px;margin-left:30px;padding:6px 12px;}&lt;br /&gt;
.quizForm input:hover[value=&amp;quot;Submit&amp;quot;]{background:#2551aa;}&lt;br /&gt;
.quizForm input[value=&amp;quot;Reset&amp;quot;]{background:#a4a4a4;border:none;color:#FFF;margin-right:10px;padding:6px 12px;}&lt;br /&gt;
.quizForm input:hover[value=&amp;quot;Reset&amp;quot;]{background:#858585;}&lt;br /&gt;
.quiz .correction{background-color:#ffe4c9;display:block;font-weight:700;margin:10px 0 30px 28px;padding:20px;}&lt;br /&gt;
&lt;br /&gt;
.bi {&lt;br /&gt;
    display: inline-block;&lt;br /&gt;
    vertical-align: -0.125em;&lt;br /&gt;
}&lt;br /&gt;
/* Styles for section cards */&lt;br /&gt;
.sectionflex {display: flex; flex-wrap: wrap; justify-content:space-between; gap:20px}&lt;br /&gt;
.sectionflex.col1 &amp;gt; div {flex-basis:100%; padding:10px 20px; }&lt;br /&gt;
.sectionflex.col2 &amp;gt; div {flex-basis:48%; padding:10px 20px; }&lt;br /&gt;
.sectionflex.col3 &amp;gt; div {flex-basis:32%; padding:10px 20px;}&lt;br /&gt;
.sectionflex.col4 &amp;gt; div {flex-basis:23%; padding:10px 20px;}&lt;br /&gt;
.sectionflex &amp;gt; div.empty {border:none; background:none}&lt;br /&gt;
#mw-content-text .sectionflex &amp;gt; div h2 {margin:0 0 1em 0; font-size:1.3em}&lt;br /&gt;
#mw-content-text .sectionflex &amp;gt; div h3 {margin:0 0 1em; font-size:1.2em}    &lt;br /&gt;
.sectionflex.frame &amp;gt; div {border: 1px solid #e7e7e7}&lt;br /&gt;
.sectionflex.background&amp;gt; div {background: #f1f3f9}&lt;br /&gt;
.sectionflex .ve-ce-branchNode-slug, .sectionflex span.mw-editsection {display:none}&lt;br /&gt;
.sectionflex.linked a {display:block}&lt;br /&gt;
.sectionflex.centered &amp;gt; div {text-align:center;}&lt;br /&gt;
&lt;br /&gt;
/*Feature-Box auf HP*/&lt;br /&gt;
.sectionflex .featurebox {padding:0!important}&lt;br /&gt;
#mw-content-text .sectionflex .featurebox h2 {border:0; margin-bottom:0!important}&lt;br /&gt;
.featurebox a {color:#444 !important;display:block; padding:4px}&lt;br /&gt;
.featurebox a:hover {text-decoration:none !important}&lt;br /&gt;
.featurebox:focus, .featurebox:hover {background:#fafafa; border: 1px solid #d4d4da!important}&lt;br /&gt;
#bodyContent .featurebox .sectionanchors-button {display:none !important}&lt;br /&gt;
.featurebox span[class*=fas] {margin-bottom:0.5em}&lt;br /&gt;
&lt;br /&gt;
/*Themen*/&lt;br /&gt;
.sectionflex.themenhd div [class*=&amp;quot; bi-&amp;quot;]::before {font-size: 1.6em; vertical-align: middle; padding: 6px; border-radius: 50%;}&lt;br /&gt;
.sectionflex.themenhd  div [class*=&amp;quot; bi-&amp;quot;]::before {font-size:2em; vertical-align:middle; background-color:#f1f3f9; padding: 10px; }&lt;br /&gt;
.sectionflex.themenhd.background  div [class*=&amp;quot; bi-&amp;quot;]::before {font-size:2em; vertical-align:middle; background-color:#fff; padding: 10px; }&lt;br /&gt;
.themenhd div a {display:block}&lt;br /&gt;
.themenhd div:hover {background:rgb(233,233,238,0.5)}&lt;br /&gt;
ul.smw-format.ul-format.alltopics-col {column-count: 3;}&lt;br /&gt;
@media (max-width: 767px) {.sectionflex.col2 &amp;gt; div, .sectionflex.col3 &amp;gt; div {flex-basis:100%; margin-top:2em}}&lt;br /&gt;
&lt;br /&gt;
/*Präsentationen*/&lt;br /&gt;
* {&lt;br /&gt;
 -webkit-print-color-adjust: exact !important;   /* Chrome, Safari */&lt;br /&gt;
 color-adjust: exact !important;                 /*Firefox*/&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
.bs-data-after-content, .mw-lingo-tooltip {display:none}&lt;br /&gt;
.slideNav {font-size:1rem}&lt;br /&gt;
.slideNext::after {font-family:&amp;quot;fontawesome&amp;quot;; content:&amp;quot;\f061&amp;quot;; color:blue; margin-left: 5px;}&lt;br /&gt;
.slidePrevious::before {font-family:&amp;quot;fontawesome&amp;quot;; content:&amp;quot;\f060&amp;quot;; color:blue; margin-right:5px;}&lt;br /&gt;
.slideHd h1 {border-bottom: 1px solid #e5e5e5;}&lt;br /&gt;
.main-footer {display:none;}&lt;br /&gt;
.slideBoxes {&lt;br /&gt;
    display: flex;&lt;br /&gt;
    flex-direction: row;&lt;br /&gt;
    flex-wrap: wrap;&lt;br /&gt;
    justify-content: center;&lt;br /&gt;
    align-items: stretch;&lt;br /&gt;
}&lt;br /&gt;
.slideBoxes &amp;gt; div {&lt;br /&gt;
    width: 45%;&lt;br /&gt;
    color: #242424;&lt;br /&gt;
    background-color: #f2f2f2;&lt;br /&gt;
    border-radius: 20px;&lt;br /&gt;
    padding: 4px 30px;&lt;br /&gt;
    margin: 15px;&lt;br /&gt;
    justify-content:center;&lt;br /&gt;
}&lt;br /&gt;
.slideBoxes &amp;gt; div.empty {background:none;}&lt;br /&gt;
.slideBoxes.hdOnly &amp;gt; div.haslink {transition: all .3s cubic-bezier(.25,.8,.25,1); cursor: pointer;}&lt;br /&gt;
.slideBoxes.hdOnly &amp;gt; div.haslink:hover {box-shadow: 0 14px 28px rgba(0,0,0,.25),0 10px 10px rgba(0,0,0,.22);}&lt;br /&gt;
.slideBoxes.hdOnly &amp;gt; div {padding:10px;}&lt;br /&gt;
.slideBoxes.col3 &amp;gt; div {width:30%;}&lt;br /&gt;
.slideBoxes.col1 &amp;gt; div {width:90%;}&lt;br /&gt;
#content #bodyContent .slideBoxes h2 {&lt;br /&gt;
	font-size:1.375rem;&lt;br /&gt;
border-bottom: 0px;&lt;br /&gt;
padding-bottom: 0;&lt;br /&gt;
margin-top: 10px;&lt;br /&gt;
margin-bottom: 0px;&lt;br /&gt;
font-weight:bold; &lt;br /&gt;
color: #242424;&lt;br /&gt;
position:relative;&lt;br /&gt;
}&lt;br /&gt;
#content #bodyContent #mw-content-text .slideBoxes h2 {padding-left:68px; display:block; min-height:2em;}&lt;br /&gt;
#content #bodyContent #mw-content-text .slideBoxes.noicon h2 {padding-left:0;}&lt;br /&gt;
#content #bodyContent #mw-content-text .slideBoxes h2 a {color: #242424 !important;}&lt;br /&gt;
&lt;br /&gt;
#content #bodyContent .slideBoxes p {&lt;br /&gt;
margin-top:0.5em;&lt;br /&gt;
font-size:1.2em;&lt;br /&gt;
}&lt;br /&gt;
.slideBoxes .fas,.slideBoxes .fab, .slideBoxes .fa {&lt;br /&gt;
    margin-right: 20px;&lt;br /&gt;
    vertical-align: sub;&lt;br /&gt;
    font-size:1.7em;&lt;br /&gt;
    margin-left:-56px;&lt;br /&gt;
}&lt;br /&gt;
.slidetext, .slidetext p, .slidetext div, .slidetext h3 {font-size:1.3rem;}&lt;br /&gt;
#slidecollection {width:100%;}&lt;br /&gt;
#slidecollection .slideNav {display:none;}&lt;br /&gt;
#slidecollection .slide {padding-top:30px; &lt;br /&gt;
background:url(&#039;https://de.wiki.bluespice.com/w/nsfr_img_auth.php/6/60/BlueSpice_Logo_v2020-steel-150.png&#039;)top right no-repeat !important;&lt;br /&gt;
background-size:50px;}&lt;br /&gt;
&lt;br /&gt;
.collapsers h2 {background:#e7e7e7; border:0; padding:10px; color:#333}&lt;br /&gt;
&lt;br /&gt;
/*Referenz Seiten */&lt;br /&gt;
.extension-infobox {width:25em;font-size:90%;background-color:#f1f3f9;color:black;margin-bottom:0.5em;margin-left:1em;padding:0.2em;float:right;clear:right;text-align:left;}&lt;br /&gt;
.extension-infobox-header{text-align:center;background-color:#2e6096;padding:8px; color:#ffffff;}&lt;br /&gt;
.extension-infobox-headertext{font-size:larger;color:#FFFFFF;}&lt;br /&gt;
.extension-infobox-description{font-weight:normal!important;text-align:left;background-color:#f1f3f9;padding:20px 10px 20px 10px!important;}&lt;br /&gt;
.extension-infobox-first-row{vertical-align:top;padding:20px 10px 0 10px;}&lt;br /&gt;
.extension-infobox-row{vertical-align:top;padding:0 10px;}&lt;br /&gt;
.extension-infobox-last-row{vertical-align:top;padding:0 10px 20px 10px;}&lt;br /&gt;
.extension-infobox-helppage{font-weight:normal;text-align:center;vertical-align:top;padding-left:10px;padding-top:10px;padding-bottom:10px;background-color:#eeeeee;}&lt;br /&gt;
.extension-infobox.fullwidth {width:100%; float:none;  font-size:1em; margin-left:0;}&lt;br /&gt;
.extension-infobox.fullwidth th {text-align:right; }&lt;br /&gt;
.extension-infobox-header, .extension-infobox-helppage {text-align:center !important; font-size:1.1em}&lt;br /&gt;
.extension-infobox.fullwidth th, .extension-infobox.fullwidth td {padding:8px;width:100px; border: 1px solid #ffffff;}&lt;br /&gt;
.extension-infobox.fullwidth td {width:300px; }&lt;br /&gt;
.extension-infobox-helppage { background-color: #eaecf0;}&lt;br /&gt;
#content #bodyContent #importdata h3 {margin:1em 0 1.4em;}&lt;br /&gt;
#importdata .flexbox {justify-content: space-between; margin-top: 2em;}&lt;br /&gt;
#mw-content-text #importdata .flexbox h3, [class^=&amp;quot;mw-content-&amp;quot;] #importdata .flexbox h3 {background:#d8d8d9; margin:0 0  12px 0; padding:8px; font-size:1em !important; font-weight:bold}&lt;br /&gt;
#importdata .mw li {margin-left:0;list-style-type:none; padding-left:30px; background:  no-repeat left 1px top 3px / 18px url(&#039;/w/nsfr_img_auth.php/c/c6/MediaWiki-2020-small-icon.svg&#039;);}&lt;br /&gt;
#importdata .bs li {margin-left:0;list-style-type:none; padding-left:30px; background:  no-repeat left 2px top 4px / 15px url(&#039;/w/nsfr_img_auth.php/c/c4/Bluespice_Icon.svg&#039;);}&lt;br /&gt;
#importdata .flexbox div {background:#f1f3f9; text-align:left; margin:0; flex-basis:33%; padding:0}&lt;br /&gt;
#importdata table.wikitable &amp;gt; tr &amp;gt; th, #importdata table.wikitable &amp;gt; * &amp;gt; tr &amp;gt; th,  table.wikitable.reference &amp;gt; tr &amp;gt; th, .importdata .wikitable.reference &amp;gt; * &amp;gt; tr &amp;gt; th {background-color: #eaecf0;text-align: left;padding:8px; border: 1px solid #ffffff}&lt;br /&gt;
#importdata  table.wikitable &amp;gt; tr &amp;gt; td, #importdata  table.wikitable &amp;gt; * &amp;gt; tr &amp;gt; td, #importdata  table.wikitable.reference &amp;gt; tr &amp;gt; td, #importdata  table.wikitable.reference &amp;gt; * &amp;gt; tr &amp;gt; td {padding:8px;  border: 1px solid #ffffff;}&lt;br /&gt;
#importdata div .inner {padding:8px 12px}&lt;br /&gt;
#importdata .bs p {font-size: 0.9rem; margin-left: 2.1em; display:list-item;}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
/*404 system message badaccess-groups*/&lt;br /&gt;
#system404-error {text-align:center;}&lt;br /&gt;
#system404-error div.floatnone a.image img {padding:0; margin:0;}&lt;br /&gt;
#system404-error hr {&lt;br /&gt;
    margin-top: 0px;&lt;br /&gt;
    margin-bottom: 2rem;&lt;br /&gt;
    border: 0;&lt;br /&gt;
    max-width: 600px;&lt;br /&gt;
    border-top: 3px dotted #ddd;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#content .toc	li 	{margin-bottom: 0.1em;}&lt;br /&gt;
&lt;br /&gt;
/* Icon in boxes on reference pages */&lt;br /&gt;
.questionmark-icon::before {&lt;br /&gt;
   content: &#039;\f059&#039;;&lt;br /&gt;
   font-family: &#039;fontawesome&#039;;&lt;br /&gt;
   color:#6f6969;&lt;br /&gt;
   vertical-align: -0.1em;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
/*Quick Search */&lt;br /&gt;
#bs-extendedsearch-box .bs-extendedsearch-autocomplete-popup {overflow-y:scroll; max-height:750px}&lt;br /&gt;
&lt;br /&gt;
.bs-extendedsearch-autocomplete-popup .bs-extendedsearch-autocomplete-popup-item {background:#f1f3f9; margin:0 10px 6px 0; border-radius:4px;}&lt;br /&gt;
#bs-extendedsearch-box .bs-extendedsearch-autocomplete-popup .bs-extendedsearch-autocomplete-popup-primary .bs-extendedsearch-autocomplete-popup-primary-item:hover {background:#fff}&lt;br /&gt;
.oo-ui-icon-articleRedirect {background-size:80%}&lt;br /&gt;
.bs-extendedsearch-autocomplete-popup-item-header-redirect a {&lt;br /&gt;
    width: 85%!important;&lt;br /&gt;
    font-size: 0.9em&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
/*Accessibility form*/&lt;br /&gt;
div[data-form=&amp;quot;Pagedraft:AccessibilityReport&amp;quot;] .oo-ui-fieldLayout-body &amp;gt; .oo-ui-fieldLayout-header {width:12em !important;  text-align:right; padding-right:0 !important; border-bottom:1px solid #d0cece}&lt;br /&gt;
&lt;br /&gt;
div[data-form=&amp;quot;Pagedraft:AccessibilityReport&amp;quot;] .oo-ui-fieldLayout-body &amp;gt;  .oo-ui-fieldLayout-field {width:40em !important}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
/*popImg template */&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
.tippy-content-container .thumbinner a &amp;gt; img {width: 100%;}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
/*Number footnotes separately */&lt;br /&gt;
#mw-content-text  .references ::marker {&lt;br /&gt;
    content: &amp;quot; &amp;quot;;	&lt;br /&gt;
}&lt;br /&gt;
#mw-content-text  ol.references {&lt;br /&gt;
    counter-reset:ref; list-style-type:none;&lt;br /&gt;
}&lt;br /&gt;
#mw-content-text  ol.references li:before{&lt;br /&gt;
    counter-increment:ref;&lt;br /&gt;
    content:counter(ref) &amp;quot;. &amp;quot;;&lt;br /&gt;
    float: left;&lt;br /&gt;
    margin-right: 1em;&lt;br /&gt;
	}&lt;br /&gt;
#mw-content-text  ol &amp;gt; li li {&lt;br /&gt;
    margin-left:-0.3em;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
.tabs&lt;br /&gt;
{&lt;br /&gt;
  &lt;br /&gt;
    list-style-type: none;&lt;br /&gt;
    margin:0!important;&lt;br /&gt;
     border-bottom: 1px solid #e9e9ee;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
    .tabs li&lt;br /&gt;
    {   display: inline-block;&lt;br /&gt;
        font-size: 1em;&lt;br /&gt;
        font-weight: bold;&lt;br /&gt;
        padding: 11px 20px; &lt;br /&gt;
        border-radius:4px 4px 0 0;&lt;br /&gt;
        border: 1px solid #e9e9ee;&lt;br /&gt;
        border-bottom:0;&lt;br /&gt;
        margin:0&lt;br /&gt;
    &lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
.tabs li:hover {background: #f2f3f9;}&lt;br /&gt;
&lt;br /&gt;
.tabs li.current {background: #f2f3f9; border:none; padding: 10px 20px; }&lt;br /&gt;
.cards.startpages {gap:28px}&lt;br /&gt;
.cards.startpages div {width:350px;}&lt;br /&gt;
.cards.startpages .screenshot {width:100%; height:420px}&lt;br /&gt;
&lt;br /&gt;
/*page forms*/&lt;br /&gt;
#pfForm .createboxInput,#pfForm input {width:auto;}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
/*Quick Search */&lt;br /&gt;
&lt;br /&gt;
.bs-extendedsearch-autocomplete-popup.compact .bs-extendedsearch-autocomplete-popup-primary {&lt;br /&gt;
    font-size: 1em;&lt;br /&gt;
    width: 100%;&lt;br /&gt;
    padding-bottom: 5px;&lt;br /&gt;
    text-align:left;&lt;br /&gt;
    overflow: hidden;&lt;br /&gt;
    border-bottom:10px solid #f1f3f9; border-top:0&lt;br /&gt;
}&lt;br /&gt;
/*.bs-extendedsearch-autocomplete-popup.compact .bs-extendedsearch-autocomplete-popup-primary .bs-extendedsearch-autocomplete-popup-primary-item  {&lt;br /&gt;
    padding: 6px;&lt;br /&gt;
    height: fit-content;&lt;br /&gt;
    max-height: unset!important;    &lt;br /&gt;
    background:#f1f3f9;&lt;br /&gt;
    margin:3px;&lt;br /&gt;
}*/&lt;br /&gt;
#bs-extendedsearch-box .bs-extendedsearch-autocomplete-popup .bs-extendedsearch-autocomplete-popup-primary .bs-extendedsearch-autocomplete-popup-primary-item .bs-extendedsearch-autocomplete-popup-primary-item-header {&lt;br /&gt;
    width: 100%;&lt;br /&gt;
    color:#444;&lt;br /&gt;
    font-size:1.1em;&lt;br /&gt;
}&lt;br /&gt;
.bs-extendedsearch-result-original-title {&lt;br /&gt;
    font-size:0.85em&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
/*temporary language switcher*/&lt;br /&gt;
.ddlistwrapper {display:inline-block; padding:8px 10px 4px 10px!important; text-align:right; background:#f1f3f9; vertical-align:middle; float:right}&lt;br /&gt;
.ddlist .dropdown-menu {left: 2px!important;}&lt;br /&gt;
&lt;br /&gt;
/*table type Content*/&lt;br /&gt;
table.contenttable thead tr, table.contenttable th {&lt;br /&gt;
    background-color: #f1f3f9;&lt;br /&gt;
    border: 1px solid #d3d5da;&lt;br /&gt;
	font-weight:400;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
/*Glossar als Tabelle formatieren */&lt;br /&gt;
&lt;br /&gt;
#glossar h2 {font-size:1.4em; margin:0}&lt;br /&gt;
#glossar dl {&lt;br /&gt;
  border: 1px solid #d8d8d9;&lt;br /&gt;
  display: grid;&lt;br /&gt;
  grid-template-columns: 200px 1fr;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
#glossar dt,&lt;br /&gt;
#glossar dd {&lt;br /&gt;
  border-bottom: 1px solid #aeaeae;&lt;br /&gt;
  padding: 8px; &lt;br /&gt;
  margin:0;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
#glossar dt:last-of-type,&lt;br /&gt;
#glossar dd:last-of-type {&lt;br /&gt;
  border-bottom: none;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
#glossar dt{&lt;br /&gt;
  font-weight: bold;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
#glossar dd {&lt;br /&gt;
  border-left: 1px solid #aeaeae;&lt;br /&gt;
  margin-left: 0;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
/* TOC auf der Glossar-Seite als Sprunglinks anzeigen.*/&lt;br /&gt;
&lt;br /&gt;
.page-Glossar .tocnumber {display:none} /*hide numbering if set*/&lt;br /&gt;
.page-Glossar .toctext {padding-left:10px;}  /*adds left-padding if no numbers are shown*/&lt;br /&gt;
.page-Glossar .toctitle {display:none} /*hide title if set*/&lt;br /&gt;
.page-Glossar #toc {background:#efefef}&lt;br /&gt;
.page-Glossar ul &amp;gt;  li.toclevel-1  {display:inline-block}&lt;br /&gt;
.page-Glossar  ul  ul {display:none}&lt;br /&gt;
.page-Glossar ul &amp;gt; li.toclevel-1:after {content:&#039;|&#039;; padding-left:10px}&lt;br /&gt;
.page-Glossar ul &amp;gt; li.toclevel-1:last-child:after {content:&#039;&#039;; padding-left:10px}&lt;br /&gt;
.page-Glossar .toc {width:100%;}&lt;br /&gt;
&lt;br /&gt;
.bs-extendedsearch-result-container.redirect {&lt;br /&gt;
    display: none; &lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
#content .toc {margin-top:1em}&lt;br /&gt;
#mw-content-text li {margin-top:0.6em; margin-bottom:1em}&lt;br /&gt;
#content .toc {margin-top:1em}&lt;br /&gt;
#content .toc li {margin-top:0.2em; margin-bottom:0.4em}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
/*Hompeage BS5*/&lt;br /&gt;
.mpbs5 #mpbanner-title {color:#4b80eb}&lt;br /&gt;
.mpbs5 h1#mpbanner-byline {color:#555}&lt;br /&gt;
.mpbs5  #mpbsv {color:#4666cd}&lt;br /&gt;
.mpbs5 #aktuelles {background: #5d80ec1a}&lt;br /&gt;
.mpbs5 #aktuelles h2::before {color: #445389;}&lt;br /&gt;
#startpage.mpbs5 .sectionflexcontainer&amp;gt;div h2 {padding:20px 15px 5px 15px}&lt;br /&gt;
.mpbs5 .section-featured h2 {font-size:1.2em; margin:0 0 1em 0;border-bottom:none;color:#555}&lt;br /&gt;
&lt;br /&gt;
.mpbs5 .sectionflexcontainer .bi::before {margin-right:10px;}&lt;br /&gt;
.mpbs5 .sectionflexcontainer &amp;gt; div {padding:0!important}&lt;br /&gt;
.mpbs5 .sectionflexcontainer .content {padding:20px}&lt;br /&gt;
.mpbs5 .bghp  {display:block;height:150px; padding:0; margin:0;}&lt;br /&gt;
&lt;br /&gt;
.mpbs5 #bg-admins  {background:url(&#039;/w/nsfr_img_auth.php/8/84/pexels-yankrukov-7693107.jpg&#039;) no-repeat; background-size:cover}&lt;br /&gt;
.mpbs5 #bg-users {background:url(&#039;/w/nsfr_img_auth.php/c/cf/pexels-canvastudio-3277806.jpg&#039;) no-repeat; background-size:cover}&lt;br /&gt;
.mpbs5 #bg-topics {background:url(&#039;/w/nsfr_img_auth.php/9/93/BlueSpice-MediaWiki_Solutions_Losungen.jpg&#039;) no-repeat; background-size:cover}&lt;br /&gt;
.mpbs5 #bg-setup {background:url(&#039;/w/nsfr_img_auth.php/b/b4/pexels-djordje-petrovic-590080-2102416.jpg&#039;) no-repeat; background-size:cover}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
/*Featurebox */&lt;br /&gt;
.sectionflexcontainer &amp;gt; div.featurebox h2 { font-size: 1.2em; border-bottom: none;  margin: 0;}&lt;br /&gt;
.mpbs5 .featurebox {border-radius:8px; box-shadow: 0px 5px 12px -3px rgba(0,0,0,0.1); padding:0}&lt;br /&gt;
&lt;br /&gt;
#startpage.mpbs5 .sectionflexcontainer &amp;gt; div.featurebox h3 {padding:0; margin:0; font-size:1.1em}&lt;br /&gt;
#startpage.mpbs5 .sectionflexcontainer .featurebox {padding:10px 10px 10px 50px!important; position:relative}&lt;br /&gt;
.mpbs5 .featurebox:hover {border     &lt;br /&gt;
    :1px solid #747474!important}&lt;br /&gt;
&lt;br /&gt;
.mpbs5 .featurebox.icon:before {Font-family:&#039;fontawesome&#039;, &#039;bootstrap-icons&#039;;position:absolute; left:10px;top:20%; font-size:2.2em; color:#979797}&lt;br /&gt;
&lt;br /&gt;
.mpbs5 #bg-pagelinks:before  {content:&#039;\f0c1&#039;;}&lt;br /&gt;
.mpbs5 #bg-translation:before  {content:&#039;\f0ac&#039;;}&lt;br /&gt;
.mpbs5 #bg-bpmn:before  {content:&#039;\f0e8&#039;;}&lt;br /&gt;
.mpbs5 #bg-pdfexport:before  {content:&#039;\f1c1&#039;;}&lt;br /&gt;
.mpbs5 #bg-ai:before  {content:&#039;\f6b1&#039;; font-size:2.4em}&lt;br /&gt;
.mpbs5 #bg-blog:before  {content:&#039;\f075&#039;;}&lt;br /&gt;
.mpbs5 #bg-collabpads:before  {content:&#039;\f0c0&#039;;}&lt;br /&gt;
&lt;br /&gt;
/* Hide PDF Exclude Tags*/&lt;br /&gt;
.hf-nsheader .pdfcreator-excludestart,&lt;br /&gt;
.hf-nsheader .pdfcreator-excludeend,&lt;br /&gt;
.hf-nsfooter .pdfcreator-excludestart,&lt;br /&gt;
.hf-nsfooter .pdfcreator-excludeend{&lt;br /&gt;
	display: none;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
/*Stile für die Unterseitennavigation über Erweiterung HeaderFooter  */&lt;br /&gt;
.hf-navbox {background: #f2f3f9; padding:1em; margin-bottom:2em}&lt;br /&gt;
.hf-subpages .subpagelist ul { margin-top:1em; margin-bottom:1em; column-count:3 }&lt;br /&gt;
#mw-content-text .hf-subpages .subpagelist li {margin-top:0}&lt;br /&gt;
.hf-subpages .default {display:none; line-height:0; overflow:hidden} /*avoid empty space if there are no subpages*/&lt;br /&gt;
.wcagnote {border:1px solid  #e9bb06;padding:2px 6px; border-radius:6px; background:#fffdeb;}&lt;br /&gt;
&lt;br /&gt;
/* See ERM45154 */&lt;br /&gt;
html {&lt;br /&gt;
 filter: none !important;&lt;br /&gt;
 color-scheme: light !important;&lt;br /&gt;
}&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-06/CSAF20.json&amp;diff=13224</id>
		<title>Security:Security Advisories/BSSA-2025-06/CSAF20.json</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-06/CSAF20.json&amp;diff=13224"/>
		<updated>2025-10-27T08:44:16Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: Created page with &amp;quot;&amp;lt;syntaxhighlight lang=&amp;quot;json&amp;quot;&amp;gt; {   &amp;quot;document&amp;quot;: {     &amp;quot;category&amp;quot;: &amp;quot;csaf_security_advisory&amp;quot;,     &amp;quot;csaf_version&amp;quot;: &amp;quot;2.0&amp;quot;,     &amp;quot;title&amp;quot;: &amp;quot;BlueSpice Security Advisory - October 2025&amp;quot;,     &amp;quot;publisher&amp;quot;: {       &amp;quot;name&amp;quot;: &amp;quot;BlueSpice&amp;quot;,       &amp;quot;contact_details&amp;quot;: &amp;quot;Reported by various community members&amp;quot;,       &amp;quot;category&amp;quot;: &amp;quot;vendor&amp;quot;,       &amp;quot;namespace&amp;quot;: &amp;quot;https://www.bluespice.com&amp;quot;     },     &amp;quot;tracking&amp;quot;: {       &amp;quot;id&amp;quot;: &amp;quot;BSSA-2025-05&amp;quot;,       &amp;quot;status&amp;quot;: &amp;quot;final&amp;quot;,       &amp;quot;revision_history&amp;quot;: [...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;syntaxhighlight lang=&amp;quot;json&amp;quot;&amp;gt;&lt;br /&gt;
{&lt;br /&gt;
  &amp;quot;document&amp;quot;: {&lt;br /&gt;
    &amp;quot;category&amp;quot;: &amp;quot;csaf_security_advisory&amp;quot;,&lt;br /&gt;
    &amp;quot;csaf_version&amp;quot;: &amp;quot;2.0&amp;quot;,&lt;br /&gt;
    &amp;quot;title&amp;quot;: &amp;quot;BlueSpice Security Advisory - October 2025&amp;quot;,&lt;br /&gt;
    &amp;quot;publisher&amp;quot;: {&lt;br /&gt;
      &amp;quot;name&amp;quot;: &amp;quot;BlueSpice&amp;quot;,&lt;br /&gt;
      &amp;quot;contact_details&amp;quot;: &amp;quot;Reported by various community members&amp;quot;,&lt;br /&gt;
      &amp;quot;category&amp;quot;: &amp;quot;vendor&amp;quot;,&lt;br /&gt;
      &amp;quot;namespace&amp;quot;: &amp;quot;https://www.bluespice.com&amp;quot;&lt;br /&gt;
    },&lt;br /&gt;
    &amp;quot;tracking&amp;quot;: {&lt;br /&gt;
      &amp;quot;id&amp;quot;: &amp;quot;BSSA-2025-05&amp;quot;,&lt;br /&gt;
      &amp;quot;status&amp;quot;: &amp;quot;final&amp;quot;,&lt;br /&gt;
      &amp;quot;revision_history&amp;quot;: [&lt;br /&gt;
        {&lt;br /&gt;
          &amp;quot;number&amp;quot;: &amp;quot;1.0.0&amp;quot;,&lt;br /&gt;
          &amp;quot;date&amp;quot;: &amp;quot;2025-10-27T01:00:00.000Z&amp;quot;,&lt;br /&gt;
          &amp;quot;summary&amp;quot;: &amp;quot;Initial release&amp;quot;&lt;br /&gt;
        }&lt;br /&gt;
      ],&lt;br /&gt;
      &amp;quot;generator&amp;quot;: {&lt;br /&gt;
        &amp;quot;date&amp;quot;: &amp;quot;2025-10-27T08:42:29.936Z&amp;quot;,&lt;br /&gt;
        &amp;quot;engine&amp;quot;: {&lt;br /&gt;
          &amp;quot;version&amp;quot;: &amp;quot;2.5.38&amp;quot;,&lt;br /&gt;
          &amp;quot;name&amp;quot;: &amp;quot;Secvisogram&amp;quot;&lt;br /&gt;
        }&lt;br /&gt;
      },&lt;br /&gt;
      &amp;quot;current_release_date&amp;quot;: &amp;quot;2025-10-27T11:00:00.000Z&amp;quot;,&lt;br /&gt;
      &amp;quot;initial_release_date&amp;quot;: &amp;quot;2025-10-27T11:00:00.000Z&amp;quot;,&lt;br /&gt;
      &amp;quot;version&amp;quot;: &amp;quot;1.0.0&amp;quot;&lt;br /&gt;
    },&lt;br /&gt;
    &amp;quot;notes&amp;quot;: [&lt;br /&gt;
      {&lt;br /&gt;
        &amp;quot;title&amp;quot;: &amp;quot;False positives in 4.5.7 audit&amp;quot;,&lt;br /&gt;
        &amp;quot;text&amp;quot;: &amp;quot;Audit tools may detect CVE-2025-53625 and CVE-2025-59839 in builds of 4.5.7. This is because there are no fixed compatible versions of the affected components available. The versions bundled with the 4.5.7 release do contain the necessary fixes for those issues as backports. It is just their version numbers are not known to be fixed by the vulnerability databases.&amp;quot;,&lt;br /&gt;
        &amp;quot;category&amp;quot;: &amp;quot;other&amp;quot;,&lt;br /&gt;
        &amp;quot;audience&amp;quot;: &amp;quot;Sysadmins&amp;quot;&lt;br /&gt;
      }&lt;br /&gt;
    ],&lt;br /&gt;
    &amp;quot;acknowledgments&amp;quot;: [&lt;br /&gt;
      {&lt;br /&gt;
        &amp;quot;names&amp;quot;: [&lt;br /&gt;
          &amp;quot;Various community members&amp;quot;&lt;br /&gt;
        ],&lt;br /&gt;
        &amp;quot;organization&amp;quot;: &amp;quot;BlueSpice&amp;quot;,&lt;br /&gt;
        &amp;quot;summary&amp;quot;: &amp;quot;Reported by various community members&amp;quot;&lt;br /&gt;
      }&lt;br /&gt;
    ]&lt;br /&gt;
  },&lt;br /&gt;
  &amp;quot;vulnerabilities&amp;quot;: [&lt;br /&gt;
    {&lt;br /&gt;
      &amp;quot;cve&amp;quot;: &amp;quot;CVE-2025-61634&amp;quot;,&lt;br /&gt;
      &amp;quot;title&amp;quot;: &amp;quot;Denial Of Service in MediaWiki Core / REST&amp;quot;,&lt;br /&gt;
      &amp;quot;notes&amp;quot;: [&lt;br /&gt;
        {&lt;br /&gt;
          &amp;quot;type&amp;quot;: &amp;quot;general&amp;quot;,&lt;br /&gt;
          &amp;quot;text&amp;quot;: &amp;quot;Low severity. No mitigation provided.&amp;quot;,&lt;br /&gt;
          &amp;quot;category&amp;quot;: &amp;quot;summary&amp;quot;,&lt;br /&gt;
          &amp;quot;title&amp;quot;: &amp;quot;Summay&amp;quot;&lt;br /&gt;
        }&lt;br /&gt;
      ],&lt;br /&gt;
      &amp;quot;product_status&amp;quot;: {&lt;br /&gt;
        &amp;quot;fixed&amp;quot;: [&lt;br /&gt;
          &amp;quot;BlueSpice 5.1.3&amp;quot;,&lt;br /&gt;
          &amp;quot;BlueSpice 4.5.7&amp;quot;&lt;br /&gt;
        ],&lt;br /&gt;
        &amp;quot;known_affected&amp;quot;: [&lt;br /&gt;
          &amp;quot;BlueSpice 5&amp;quot;,&lt;br /&gt;
          &amp;quot;BlueSpice 4&amp;quot;&lt;br /&gt;
        ]&lt;br /&gt;
      }&lt;br /&gt;
    },&lt;br /&gt;
    {&lt;br /&gt;
      &amp;quot;cve&amp;quot;: &amp;quot;CVE-2025-61636&amp;quot;,&lt;br /&gt;
      &amp;quot;title&amp;quot;: &amp;quot;XSS in MediaWiki Core / HTMLForm&amp;quot;,&lt;br /&gt;
      &amp;quot;notes&amp;quot;: [&lt;br /&gt;
        {&lt;br /&gt;
          &amp;quot;type&amp;quot;: &amp;quot;general&amp;quot;,&lt;br /&gt;
          &amp;quot;text&amp;quot;: &amp;quot;Low severity. Affected code not used in BlueSpice by default.&amp;quot;&lt;br /&gt;
        }&lt;br /&gt;
      ],&lt;br /&gt;
      &amp;quot;product_status&amp;quot;: {&lt;br /&gt;
        &amp;quot;fixed&amp;quot;: [&lt;br /&gt;
          &amp;quot;BlueSpice 5.1.3&amp;quot;,&lt;br /&gt;
          &amp;quot;BlueSpice 4.5.7&amp;quot;&lt;br /&gt;
        ],&lt;br /&gt;
        &amp;quot;known_affected&amp;quot;: [&lt;br /&gt;
          &amp;quot;BlueSpice 5&amp;quot;&lt;br /&gt;
        ]&lt;br /&gt;
      }&lt;br /&gt;
    },&lt;br /&gt;
    {&lt;br /&gt;
      &amp;quot;cve&amp;quot;: &amp;quot;CVE-2025-61637&amp;quot;,&lt;br /&gt;
      &amp;quot;title&amp;quot;: &amp;quot;XSS in MediaWiki Core / Preview&amp;quot;,&lt;br /&gt;
      &amp;quot;notes&amp;quot;: [&lt;br /&gt;
        {&lt;br /&gt;
          &amp;quot;type&amp;quot;: &amp;quot;general&amp;quot;,&lt;br /&gt;
          &amp;quot;text&amp;quot;: &amp;quot;Low severity. Requires admin privileges (NS_MEDIAWIKI).&amp;quot;&lt;br /&gt;
        }&lt;br /&gt;
      ],&lt;br /&gt;
      &amp;quot;product_status&amp;quot;: {&lt;br /&gt;
        &amp;quot;fixed&amp;quot;: [&lt;br /&gt;
          &amp;quot;BlueSpice 5.1.3&amp;quot;,&lt;br /&gt;
          &amp;quot;BlueSpice 4.5.7&amp;quot;&lt;br /&gt;
        ],&lt;br /&gt;
        &amp;quot;known_affected&amp;quot;: [&lt;br /&gt;
          &amp;quot;BlueSpice 5&amp;quot;&lt;br /&gt;
        ]&lt;br /&gt;
      }&lt;br /&gt;
    },&lt;br /&gt;
    {&lt;br /&gt;
      &amp;quot;cve&amp;quot;: &amp;quot;CVE-2025-61638&amp;quot;,&lt;br /&gt;
      &amp;quot;title&amp;quot;: &amp;quot;XSS in MediaWiki Core / Various&amp;quot;,&lt;br /&gt;
      &amp;quot;notes&amp;quot;: [&lt;br /&gt;
        {&lt;br /&gt;
          &amp;quot;type&amp;quot;: &amp;quot;general&amp;quot;,&lt;br /&gt;
          &amp;quot;text&amp;quot;: &amp;quot;High severity. Part of standard editing functionality.&amp;quot;&lt;br /&gt;
        }&lt;br /&gt;
      ],&lt;br /&gt;
      &amp;quot;product_status&amp;quot;: {&lt;br /&gt;
        &amp;quot;fixed&amp;quot;: [&lt;br /&gt;
          &amp;quot;BlueSpice 5.1.3&amp;quot;,&lt;br /&gt;
          &amp;quot;BlueSpice 4.5.7&amp;quot;&lt;br /&gt;
        ],&lt;br /&gt;
        &amp;quot;known_affected&amp;quot;: [&lt;br /&gt;
          &amp;quot;BlueSpice 5&amp;quot;,&lt;br /&gt;
          &amp;quot;BlueSpice 4&amp;quot;&lt;br /&gt;
        ]&lt;br /&gt;
      }&lt;br /&gt;
    },&lt;br /&gt;
    {&lt;br /&gt;
      &amp;quot;cve&amp;quot;: &amp;quot;CVE-2025-61639&amp;quot;,&lt;br /&gt;
      &amp;quot;title&amp;quot;: &amp;quot;Information Disclosure in MediaWiki Core / RecentChanges&amp;quot;,&lt;br /&gt;
      &amp;quot;notes&amp;quot;: [&lt;br /&gt;
        {&lt;br /&gt;
          &amp;quot;type&amp;quot;: &amp;quot;general&amp;quot;,&lt;br /&gt;
          &amp;quot;text&amp;quot;: &amp;quot;Medium severity. No mitigation provided.&amp;quot;&lt;br /&gt;
        }&lt;br /&gt;
      ],&lt;br /&gt;
      &amp;quot;product_status&amp;quot;: {&lt;br /&gt;
        &amp;quot;fixed&amp;quot;: [&lt;br /&gt;
          &amp;quot;BlueSpice 5.1.3&amp;quot;,&lt;br /&gt;
          &amp;quot;BlueSpice 4.5.7&amp;quot;&lt;br /&gt;
        ],&lt;br /&gt;
        &amp;quot;known_affected&amp;quot;: [&lt;br /&gt;
          &amp;quot;BlueSpice 5&amp;quot;,&lt;br /&gt;
          &amp;quot;BlueSpice 4&amp;quot;&lt;br /&gt;
        ]&lt;br /&gt;
      }&lt;br /&gt;
    },&lt;br /&gt;
    {&lt;br /&gt;
      &amp;quot;cve&amp;quot;: &amp;quot;CVE-2025-61655&amp;quot;,&lt;br /&gt;
      &amp;quot;title&amp;quot;: &amp;quot;XSS in Extension:VisualEditor&amp;quot;,&lt;br /&gt;
      &amp;quot;notes&amp;quot;: [&lt;br /&gt;
        {&lt;br /&gt;
          &amp;quot;type&amp;quot;: &amp;quot;general&amp;quot;,&lt;br /&gt;
          &amp;quot;text&amp;quot;: &amp;quot;High severity. Part of standard editing functionality. Mitigation: Disable Extension:VisualEditor.&amp;quot;&lt;br /&gt;
        }&lt;br /&gt;
      ],&lt;br /&gt;
      &amp;quot;product_status&amp;quot;: {&lt;br /&gt;
        &amp;quot;fixed&amp;quot;: [&lt;br /&gt;
          &amp;quot;BlueSpice 5.1.3&amp;quot;,&lt;br /&gt;
          &amp;quot;BlueSpice 4.5.7&amp;quot;&lt;br /&gt;
        ],&lt;br /&gt;
        &amp;quot;known_affected&amp;quot;: [&lt;br /&gt;
          &amp;quot;BlueSpice 5&amp;quot;,&lt;br /&gt;
          &amp;quot;BlueSpice 4&amp;quot;&lt;br /&gt;
        ]&lt;br /&gt;
      }&lt;br /&gt;
    },&lt;br /&gt;
    {&lt;br /&gt;
      &amp;quot;cve&amp;quot;: &amp;quot;CVE-2025-59839&amp;quot;,&lt;br /&gt;
      &amp;quot;title&amp;quot;: &amp;quot;XSS in Extension:EmbedVideo&amp;quot;,&lt;br /&gt;
      &amp;quot;notes&amp;quot;: [&lt;br /&gt;
        {&lt;br /&gt;
          &amp;quot;type&amp;quot;: &amp;quot;general&amp;quot;,&lt;br /&gt;
          &amp;quot;text&amp;quot;: &amp;quot;High severity. Mitigation: Disable Extension:EmbedVideo.&amp;quot;&lt;br /&gt;
        }&lt;br /&gt;
      ],&lt;br /&gt;
      &amp;quot;product_status&amp;quot;: {&lt;br /&gt;
        &amp;quot;fixed&amp;quot;: [&lt;br /&gt;
          &amp;quot;BlueSpice 5.1.3&amp;quot;&lt;br /&gt;
        ],&lt;br /&gt;
        &amp;quot;known_affected&amp;quot;: [&lt;br /&gt;
          &amp;quot;BlueSpice 5&amp;quot;,&lt;br /&gt;
          &amp;quot;BlueSpice 4&amp;quot;&lt;br /&gt;
        ]&lt;br /&gt;
      }&lt;br /&gt;
    },&lt;br /&gt;
    {&lt;br /&gt;
      &amp;quot;cve&amp;quot;: &amp;quot;CVE-2025-54370&amp;quot;,&lt;br /&gt;
      &amp;quot;title&amp;quot;: &amp;quot;Server-side Request Forgery in Extension:DataTransfer, Extension:BlueSpiceExtendedStatistics, and Extension:BlueSpiceUEModuleTable2Excel&amp;quot;,&lt;br /&gt;
      &amp;quot;notes&amp;quot;: [&lt;br /&gt;
        {&lt;br /&gt;
          &amp;quot;type&amp;quot;: &amp;quot;general&amp;quot;,&lt;br /&gt;
          &amp;quot;text&amp;quot;: &amp;quot;Medium severity. Mitigation: Disable the affected extensions.&amp;quot;&lt;br /&gt;
        }&lt;br /&gt;
      ],&lt;br /&gt;
      &amp;quot;product_status&amp;quot;: {&lt;br /&gt;
        &amp;quot;fixed&amp;quot;: [&lt;br /&gt;
          &amp;quot;BlueSpice 5.1.3&amp;quot;&lt;br /&gt;
        ],&lt;br /&gt;
        &amp;quot;known_affected&amp;quot;: [&lt;br /&gt;
          &amp;quot;BlueSpice 5&amp;quot;,&lt;br /&gt;
          &amp;quot;BlueSpice 4&amp;quot;&lt;br /&gt;
        ]&lt;br /&gt;
      }&lt;br /&gt;
    }&lt;br /&gt;
  ]&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-06&amp;diff=13223</id>
		<title>Security:Security Advisories/BSSA-2025-06</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-06&amp;diff=13223"/>
		<updated>2025-10-27T08:31:13Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2025-10-22&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
|&lt;br /&gt;
* Current LTS version 5.1, &amp;lt; 5.1.3&lt;br /&gt;
* Legacy version 4.5, &amp;lt; 4.5.7&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|&lt;br /&gt;
* 5.1.3&lt;br /&gt;
* 4.5.7&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2024-56171 CVE-2024-56171]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-3277 CVE-2025-3277]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-6965 CVE-2025-6965]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-11173 CVE-2025-11173]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-11175 CVE-2025-11175]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-53625 CVE-2025-53625]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-54370 CVE-2025-54370]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-59839 CVE-2025-59839]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61634 CVE-2025-61634]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61635 CVE-2025-61635]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61636 CVE-2025-61636]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61637 CVE-2025-61637]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61638 CVE-2025-61638]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61639 CVE-2025-61639]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61640 CVE-2025-61640]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61641 CVE-2025-61641]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61642 CVE-2025-61642]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61643 CVE-2025-61643]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61646 CVE-2025-61646]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61652 CVE-2025-61652]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61653 CVE-2025-61653]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61655 CVE-2025-61655]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61655 CVE-2025-61655]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61656 CVE-2025-61656]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61656 CVE-2025-61656]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61657 CVE-2025-61657]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Problem ==&lt;br /&gt;
{{Textbox|boxtype=note|header=|text=The following list only contains items from [https://lists.wikimedia.org/hyperkitty/list/mediawiki-announce@lists.wikimedia.org/thread/TF4S5Y2324UIW3GOBPBWD2MSUSROG5GH/ MediaWiki 1.43.5 und 1.39.15], that are actually part of the BlueSpice distribution.|icon=yes}}&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! CVE !! Component !! Type of vulnerability !! BlueSpice 5 !! BlueSpice 4&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61634&lt;br /&gt;
| MediaWiki Core / REST&lt;br /&gt;
| Denial Of Service &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61636&lt;br /&gt;
| MediaWiki Core / HTMLForm&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61637&lt;br /&gt;
| MediaWiki Core / Preview&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61638&lt;br /&gt;
| MediaWiki Core / Various&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61639&lt;br /&gt;
| MediaWiki Core / RecentChanges&lt;br /&gt;
| Information Disclosure &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61640&lt;br /&gt;
| MediaWiki Core / RecentChanges&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61641&lt;br /&gt;
| MediaWiki Core / ActionAPI&lt;br /&gt;
| Denial Of Service &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61642&lt;br /&gt;
| MediaWiki Core / HTMLForm&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61643&lt;br /&gt;
| MediaWiki Core / RecentChanges (Feed)&lt;br /&gt;
| Information Disclosure &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61646&lt;br /&gt;
| MediaWiki Core / RecentChanges+Watchlist&lt;br /&gt;
| Information Disclosure &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61635&lt;br /&gt;
| Extension:ConfirmEdit&lt;br /&gt;
|&#039;&#039;&amp;lt;no information available&amp;gt;&#039;&#039;&lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61652, CVE-2025-11175&lt;br /&gt;
| Extension:DiscussionTools&lt;br /&gt;
| Information Disclosure&lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-11173&lt;br /&gt;
| Extension:OATHAuth&lt;br /&gt;
| Bypass authn at content check &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61653&lt;br /&gt;
| Extension:TextExtracts&lt;br /&gt;
| Information Disclosure &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61655, CVE-2025-61656&lt;br /&gt;
| Extension:VisualEditor&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61657&lt;br /&gt;
| Skin:Vector&lt;br /&gt;
|&#039;&#039;&amp;lt;no information available&amp;gt;&#039;&#039;&lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61638&lt;br /&gt;
| Parsoid&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-53625&lt;br /&gt;
| Extension:DynamicPageList &lt;br /&gt;
|Information Disclosure&lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-59839&lt;br /&gt;
| Extension:EmbedVideo &lt;br /&gt;
|XSS&lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-54370&lt;br /&gt;
| Extension:DataTransfer, Extension:BlueSpiceExtendedStatistics and Extension:BlueSpiceUEModuleTable2Excel&lt;br /&gt;
|Server-side Request Forgery&lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-3277&lt;br /&gt;
|Container &amp;lt;code&amp;gt;bluespice/database&amp;lt;/code&amp;gt; &lt;br /&gt;
|Arbitrary Code Execution&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |not affected&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-purple-bg&amp;quot; |affected&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-6965&lt;br /&gt;
|Container &amp;lt;code&amp;gt;bluespice/database&amp;lt;/code&amp;gt; &lt;br /&gt;
|Memory Corruption&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |not affected&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-purple-bg&amp;quot; |affected&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2024-56171&lt;br /&gt;
|Container &amp;lt;code&amp;gt;bluespice/database&amp;lt;/code&amp;gt; &lt;br /&gt;
|Use-After-Ffree&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |not affected&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-purple-bg&amp;quot; |affected&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Impact assessment ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
! CVE !! Assessment !! Mitigation &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;vertical-align:middle;text-align:left;&amp;quot; |CVE-2025-11173&lt;br /&gt;
| style=&amp;quot;vertical-align:middle;text-align:left;&amp;quot; class=&amp;quot;col-orange-bg&amp;quot; |Low&lt;br /&gt;
| style=&amp;quot;vertical-align:middle;text-align:left;&amp;quot; |Disable Extension:OATHAuth&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-11175&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |Part of distribution, but disabled by default&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61634&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-orange-bg&amp;quot; |Low&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-61635&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |Part of distribution, but disabled by default&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61636&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-orange-bg&amp;quot; |Low; Affected code not used in BlueSpice by default&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61637&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-orange-bg&amp;quot; |Low; Requires admin privileges (&amp;lt;code&amp;gt;NS_MEDIAWIKI&amp;lt;/code&amp;gt;)&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61638&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-purple-bg&amp;quot; |High; Part of standard editing functionality&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61639&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-red-bg&amp;quot; |Medium&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61640&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-orange-bg&amp;quot; |Low; Requires admin privileges (&amp;lt;code&amp;gt;NS_MEDIAWIKI&amp;lt;/code&amp;gt;)&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61641&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-orange-bg&amp;quot; |Low&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61642&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-orange-bg&amp;quot; |Low; Affected code not used in BlueSpice by default&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61643&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-red-bg&amp;quot; |Medium&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61646&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-red-bg&amp;quot; |Medium&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-61652&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |Part of distribution, but disabled by default&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61653&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-red-bg&amp;quot; |Medium&lt;br /&gt;
|Disable Extension:Popups and Extension:HoverCards&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61655&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-purple-bg&amp;quot; |High; Part of standard editing functionality&lt;br /&gt;
|Disable Extension:VisualEditor&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-61656&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-purple-bg&amp;quot; |High; Part of standard editing functionality&lt;br /&gt;
|Disable Extension:VisualEditor&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-61657&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |Part of distribution, but disabled by default&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-53625&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-red-bg&amp;quot; |Medium&lt;br /&gt;
|Disable Extension:DynamicPageList&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-59839&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-purple-bg&amp;quot; |High&lt;br /&gt;
|Disable Extension:EmbedVideo&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-54370&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-red-bg&amp;quot; |Medium&lt;br /&gt;
|Disable Extension:DataTransfer, Extension:BlueSpiceExtendedStatistics and Extension:BlueSpiceUEModuleTable2Excel&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-3277&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-orange-bg&amp;quot; |Low&lt;br /&gt;
|Make sure &amp;lt;code&amp;gt;bluespice/database&amp;lt;/code&amp;gt; is properly isolated from unauthorized external access&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-6965&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-orange-bg&amp;quot; |Low&lt;br /&gt;
|Make sure &amp;lt;code&amp;gt;bluespice/database&amp;lt;/code&amp;gt; is properly isolated from unauthorized external access&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2024-56171&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-orange-bg&amp;quot; |Low&lt;br /&gt;
|Make sure &amp;lt;code&amp;gt;bluespice/database&amp;lt;/code&amp;gt; is properly isolated from unauthorized external access&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
&lt;br /&gt;
* Update to BlueSpice 5.1.3&lt;br /&gt;
* Update to BlueSpice 4.5.7&lt;br /&gt;
{{Textbox|boxtype=important|header=False positives in 4.5.7 audit|text=Audit tools may detect &amp;lt;code&amp;gt;CVE-2025-53625&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;CVE-2025-59839&amp;lt;/code&amp;gt; in builds of &amp;lt;code&amp;gt;4.5.7&amp;lt;/code&amp;gt;. This is because there are no fixed compatible versions of the affected components available. The versions bundled with the &amp;lt;code&amp;gt;4.5.7&amp;lt;/code&amp;gt; release &#039;&#039;&#039;do contain the neccessary fixes&#039;&#039;&#039; for those issues as backports. It is just their version numbers are not known to be fixed by the vulnerability databases.|icon=yes}}&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
Reported by various community members&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-06&amp;diff=13222</id>
		<title>Security:Security Advisories/BSSA-2025-06</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-06&amp;diff=13222"/>
		<updated>2025-10-27T08:17:42Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2025-10-22&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
|&lt;br /&gt;
* Current LTS version 5.1, &amp;lt; 5.1.3&lt;br /&gt;
* Legacy version 4.5, &amp;lt; 4.5.7&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|&lt;br /&gt;
* 5.1.3&lt;br /&gt;
* 4.5.7&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2024-56171 CVE-2024-56171]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-3277 CVE-2025-3277]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-6965 CVE-2025-6965]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-11173 CVE-2025-11173]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-11175 CVE-2025-11175]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-53625 CVE-2025-53625]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-54370 CVE-2025-54370]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-59839 CVE-2025-59839]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61634 CVE-2025-61634]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61635 CVE-2025-61635]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61636 CVE-2025-61636]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61637 CVE-2025-61637]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61638 CVE-2025-61638]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61639 CVE-2025-61639]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61640 CVE-2025-61640]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61641 CVE-2025-61641]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61642 CVE-2025-61642]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61643 CVE-2025-61643]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61646 CVE-2025-61646]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61652 CVE-2025-61652]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61653 CVE-2025-61653]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61655 CVE-2025-61655]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61655 CVE-2025-61655]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61656 CVE-2025-61656]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61656 CVE-2025-61656]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61657 CVE-2025-61657]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Problem ==&lt;br /&gt;
{{Textbox|boxtype=note|header=|text=The following list only contains items from [https://lists.wikimedia.org/hyperkitty/list/mediawiki-announce@lists.wikimedia.org/thread/TF4S5Y2324UIW3GOBPBWD2MSUSROG5GH/ MediaWiki 1.43.5 und 1.39.15], that are actually part of the BlueSpice distribution.|icon=yes}}&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! CVE !! Component !! Type of vulnerability !! BlueSpice 5 !! BlueSpice 4&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61634&lt;br /&gt;
| MediaWiki Core / REST&lt;br /&gt;
| Denial Of Service &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61636&lt;br /&gt;
| MediaWiki Core / HTMLForm&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61637&lt;br /&gt;
| MediaWiki Core / Preview&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61638&lt;br /&gt;
| MediaWiki Core / Various&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61639&lt;br /&gt;
| MediaWiki Core / RecentChanges&lt;br /&gt;
| Information Disclosure &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61640&lt;br /&gt;
| MediaWiki Core / RecentChanges&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61641&lt;br /&gt;
| MediaWiki Core / ActionAPI&lt;br /&gt;
| Denial Of Service &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61642&lt;br /&gt;
| MediaWiki Core / HTMLForm&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61643&lt;br /&gt;
| MediaWiki Core / RecentChanges (Feed)&lt;br /&gt;
| Information Disclosure &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61646&lt;br /&gt;
| MediaWiki Core / RecentChanges+Watchlist&lt;br /&gt;
| Information Disclosure &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61635&lt;br /&gt;
| Extension:ConfirmEdit&lt;br /&gt;
|&#039;&#039;&amp;lt;no information available&amp;gt;&#039;&#039;&lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61652, CVE-2025-11175&lt;br /&gt;
| Extension:DiscussionTools&lt;br /&gt;
| Information Disclosure&lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-11173&lt;br /&gt;
| Extension:OATHAuth&lt;br /&gt;
| Bypass authn at content check &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61653&lt;br /&gt;
| Extension:TextExtracts&lt;br /&gt;
| Information Disclosure &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61655, CVE-2025-61656&lt;br /&gt;
| Extension:VisualEditor&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61657&lt;br /&gt;
| Skin:Vector&lt;br /&gt;
|&#039;&#039;&amp;lt;no information available&amp;gt;&#039;&#039;&lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61638&lt;br /&gt;
| Parsoid&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-53625&lt;br /&gt;
| Extension:DynamicPageList &lt;br /&gt;
|Information Disclosure&lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-59839&lt;br /&gt;
| Extension:EmbedVideo &lt;br /&gt;
|XSS&lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-54370&lt;br /&gt;
| Extension:DataTransfer, Extension:BlueSpiceExtendedStatistics and Extension:BlueSpiceUEModuleTable2Excel&lt;br /&gt;
|Server-side Request Forgery&lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-3277&lt;br /&gt;
|Container &amp;lt;code&amp;gt;bluespice/database&amp;lt;/code&amp;gt; &lt;br /&gt;
|Arbitrary Code Execution&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |not affected&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-purple-bg&amp;quot; |affected&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-6965&lt;br /&gt;
|Container &amp;lt;code&amp;gt;bluespice/database&amp;lt;/code&amp;gt; &lt;br /&gt;
|Memory Corruption&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |not affected&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-purple-bg&amp;quot; |affected&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2024-56171&lt;br /&gt;
|Container &amp;lt;code&amp;gt;bluespice/database&amp;lt;/code&amp;gt; &lt;br /&gt;
|Use-After-Ffree&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |not affected&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-purple-bg&amp;quot; |affected&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Impact assessment ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
! CVE !! Assessment !! Mitigation &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;vertical-align:middle;text-align:left;&amp;quot; |CVE-2025-11173&lt;br /&gt;
| style=&amp;quot;vertical-align:middle;text-align:left;&amp;quot; |&lt;br /&gt;
| style=&amp;quot;vertical-align:middle;text-align:left;&amp;quot; |&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-11175&lt;br /&gt;
|Part of distribution, but disabled by default&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61634&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-61635&lt;br /&gt;
|Part of distribution, but disabled by default&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61636&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61637&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61638&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61639&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61640&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61641&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61642&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61643&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61646&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-61652&lt;br /&gt;
|Part of distribution, but disabled by default&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61653&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61655&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-61656&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-61657&lt;br /&gt;
|Part of distribution, but disabled by default&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61638&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-53625&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-59839&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-54370&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-3277&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-6965&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2024-56171&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
&lt;br /&gt;
* Update to BlueSpice 5.1.3&lt;br /&gt;
* Update to BlueSpice 4.5.7&lt;br /&gt;
{{Textbox|boxtype=important|header=False positives in 4.5.7 audit|text=Audit tools may detect &amp;lt;code&amp;gt;CVE-2025-53625&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;CVE-2025-59839&amp;lt;/code&amp;gt; in builds of &amp;lt;code&amp;gt;4.5.7&amp;lt;/code&amp;gt;. This is because there are no fixed compatible versions of the affected components available. The versions bundled with the &amp;lt;code&amp;gt;4.5.7&amp;lt;/code&amp;gt; release &#039;&#039;&#039;do contain the neccessary fixes&#039;&#039;&#039; for those issues as backports. It is just their version numbers are not known to be fixed by the vulnerability databases.|icon=yes}}&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
Reported by various community members&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-06&amp;diff=13221</id>
		<title>Security:Security Advisories/BSSA-2025-06</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-06&amp;diff=13221"/>
		<updated>2025-10-27T07:33:27Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2025-10-22&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
|&lt;br /&gt;
* Current LTS version 5.1, &amp;lt; 5.1.3&lt;br /&gt;
* Legacy version 4.5, &amp;lt; 4.5.7&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|&lt;br /&gt;
* 5.1.3&lt;br /&gt;
* 4.5.7&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2024-56171 CVE-2024-56171]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-3277 CVE-2025-3277]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-6965 CVE-2025-6965]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-11173 CVE-2025-11173]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-11175 CVE-2025-11175]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-53625 CVE-2025-53625]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-54370 CVE-2025-54370]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-59839 CVE-2025-59839]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61634 CVE-2025-61634]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61635 CVE-2025-61635]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61636 CVE-2025-61636]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61637 CVE-2025-61637]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61638 CVE-2025-61638]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61639 CVE-2025-61639]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61640 CVE-2025-61640]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61641 CVE-2025-61641]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61642 CVE-2025-61642]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61643 CVE-2025-61643]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61646 CVE-2025-61646]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61652 CVE-2025-61652]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61653 CVE-2025-61653]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61655 CVE-2025-61655]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61655 CVE-2025-61655]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61656 CVE-2025-61656]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61656 CVE-2025-61656]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61657 CVE-2025-61657]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Problem ==&lt;br /&gt;
{{Textbox|boxtype=note|header=|text=The following list only contains items from [https://lists.wikimedia.org/hyperkitty/list/mediawiki-announce@lists.wikimedia.org/thread/TF4S5Y2324UIW3GOBPBWD2MSUSROG5GH/ MediaWiki 1.43.5 und 1.39.15], that are actually part of the BlueSpice distribution.|icon=yes}}&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! CVE !! Component !! Type of vulnerability !! BlueSpice 5 !! BlueSpice 4&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61634&lt;br /&gt;
| MediaWiki Core / REST&lt;br /&gt;
| Denial Of Service &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61636&lt;br /&gt;
| MediaWiki Core / HTMLForm&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61637&lt;br /&gt;
| MediaWiki Core / Preview&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61638&lt;br /&gt;
| MediaWiki Core / Various&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61639&lt;br /&gt;
| MediaWiki Core / RecentChanges&lt;br /&gt;
| Information Disclosure &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61640&lt;br /&gt;
| MediaWiki Core / RecentChanges&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61641&lt;br /&gt;
| MediaWiki Core / ActionAPI&lt;br /&gt;
| Denial Of Service &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61642&lt;br /&gt;
| MediaWiki Core / HTMLForm&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61643&lt;br /&gt;
| MediaWiki Core / RecentChanges (Feed)&lt;br /&gt;
| Information Disclosure &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61646&lt;br /&gt;
| MediaWiki Core / RecentChanges+Watchlist&lt;br /&gt;
| Information Disclosure &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61635&lt;br /&gt;
| Extension:ConfirmEdit&lt;br /&gt;
|&lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61652, CVE-2025-11175&lt;br /&gt;
| Extension:DiscussionTools&lt;br /&gt;
| Information Disclosure&lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-11173&lt;br /&gt;
| Extension:OATHAuth&lt;br /&gt;
| Bypass authn at content check &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61653&lt;br /&gt;
| Extension:TextExtracts&lt;br /&gt;
| Information Disclosure &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61655, CVE-2025-61656&lt;br /&gt;
| Extension:VisualEditor&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61657&lt;br /&gt;
| Skin:Vector&lt;br /&gt;
|&lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61638&lt;br /&gt;
| Parsoid&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-53625&lt;br /&gt;
| Extension:DynamicPageList &lt;br /&gt;
|Information Disclosure&lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-59839&lt;br /&gt;
| Extension:EmbedVideo &lt;br /&gt;
|&lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-54370&lt;br /&gt;
| Extension:DataTransfer, Extension:BlueSpiceExtendedStatistics and Extension:BlueSpiceUEModuleTable2Excel&lt;br /&gt;
|&lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-3277&lt;br /&gt;
|Container &amp;lt;code&amp;gt;bluespice/database&amp;lt;/code&amp;gt; &lt;br /&gt;
|&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |not affected&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-purple-bg&amp;quot; |affected&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-6965&lt;br /&gt;
|Container &amp;lt;code&amp;gt;bluespice/database&amp;lt;/code&amp;gt; &lt;br /&gt;
|&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |not affected&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-purple-bg&amp;quot; |affected&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2024-56171&lt;br /&gt;
|Container &amp;lt;code&amp;gt;bluespice/database&amp;lt;/code&amp;gt; &lt;br /&gt;
|&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |not affected&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-purple-bg&amp;quot; |affected&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Impact assessment ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
! CVE !! Assessment !! Mitigation &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;vertical-align:middle;text-align:left;&amp;quot; |CVE-2025-11173&lt;br /&gt;
| style=&amp;quot;vertical-align:middle;text-align:left;&amp;quot; |&lt;br /&gt;
| style=&amp;quot;vertical-align:middle;text-align:left;&amp;quot; |&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-11175&lt;br /&gt;
|Part of distribution, but disabled by default&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61634&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-61635&lt;br /&gt;
|Part of distribution, but disabled by default&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61636&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61637&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61638&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61639&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61640&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61641&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61642&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61643&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61646&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-61652&lt;br /&gt;
|Part of distribution, but disabled by default&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61653&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61655&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-61656&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-61657&lt;br /&gt;
|Part of distribution, but disabled by default&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61638&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-53625&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-59839&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-54370&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-3277&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-6965&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2024-56171&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
&lt;br /&gt;
* Update to BlueSpice 5.1.3&lt;br /&gt;
* Update to BlueSpice 4.5.7&lt;br /&gt;
{{Textbox|boxtype=important|header=False positives in 4.5.7 audit|text=Audit tools may detect &amp;lt;code&amp;gt;CVE-2025-53625&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;CVE-2025-59839&amp;lt;/code&amp;gt; in builds of &amp;lt;code&amp;gt;4.5.7&amp;lt;/code&amp;gt;. This is because there are no fixed compatible versions of the affected components available. The versions bundled with the &amp;lt;code&amp;gt;4.5.7&amp;lt;/code&amp;gt; release &#039;&#039;&#039;do contain the neccessary fixes&#039;&#039;&#039; for those issues as backports. It is just their version numbers are not known to be fixed by the vulnerability databases.|icon=yes}}&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
Reported by various community members&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-06&amp;diff=13220</id>
		<title>Security:Security Advisories/BSSA-2025-06</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-06&amp;diff=13220"/>
		<updated>2025-10-27T07:22:25Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2025-10-22&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
|&lt;br /&gt;
* Current LTS version 5.1, &amp;lt; 5.1.3&lt;br /&gt;
* Legacy version 4.5, &amp;lt; 4.5.7&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|&lt;br /&gt;
* 5.1.3&lt;br /&gt;
* 4.5.7&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2024-56171 CVE-2024-56171]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-3277 CVE-2025-3277]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-6965 CVE-2025-6965]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-11173 CVE-2025-11173]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-11175 CVE-2025-11175]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-53625 CVE-2025-53625]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-54370 CVE-2025-54370]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-59839 CVE-2025-59839]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61634 CVE-2025-61634]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61635 CVE-2025-61635]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61636 CVE-2025-61636]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61637 CVE-2025-61637]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61638 CVE-2025-61638]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61639 CVE-2025-61639]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61640 CVE-2025-61640]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61641 CVE-2025-61641]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61642 CVE-2025-61642]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61643 CVE-2025-61643]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61646 CVE-2025-61646]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61652 CVE-2025-61652]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61653 CVE-2025-61653]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61655 CVE-2025-61655]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61655 CVE-2025-61655]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61656 CVE-2025-61656]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61656 CVE-2025-61656]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61657 CVE-2025-61657]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Problem ==&lt;br /&gt;
{{Textbox|boxtype=note|header=|text=The following list only contains items from [https://lists.wikimedia.org/hyperkitty/list/mediawiki-announce@lists.wikimedia.org/thread/TF4S5Y2324UIW3GOBPBWD2MSUSROG5GH/ MediaWiki 1.43.5 und 1.39.15], that are actually part of the BlueSpice distribution.|icon=yes}}&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! CVE !! Component !! Type of vulnerability !! BlueSpice 5 !! BlueSpice 4&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61634&lt;br /&gt;
| MediaWiki Core / REST&lt;br /&gt;
| Denial Of Service &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61636&lt;br /&gt;
| MediaWiki Core / HTMLForm&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61637&lt;br /&gt;
| MediaWiki Core / Preview&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61638&lt;br /&gt;
| MediaWiki Core / Various&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61639&lt;br /&gt;
| MediaWiki Core / RecentChanges&lt;br /&gt;
| Information Disclosure &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61640&lt;br /&gt;
| MediaWiki Core / RecentChanges&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61641&lt;br /&gt;
| MediaWiki Core / ActionAPI&lt;br /&gt;
| Denial Of Service &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61642&lt;br /&gt;
| MediaWiki Core / HTMLForm&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61643&lt;br /&gt;
| MediaWiki Core / RecentChanges (Feed)&lt;br /&gt;
| Information Disclosure &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61646&lt;br /&gt;
| MediaWiki Core / RecentChanges+Watchlist&lt;br /&gt;
| Information Disclosure &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61635&lt;br /&gt;
| Extension:ConfirmEdit&lt;br /&gt;
| Part of distribution, but disabled by default &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61652, CVE-2025-11175&lt;br /&gt;
| Extension:DiscussionTools&lt;br /&gt;
| Information Disclosure ( Part of distribution, but disabled by default )&lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-11173&lt;br /&gt;
| Extension:OATHAuth&lt;br /&gt;
| Bypass authn at content check &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61653&lt;br /&gt;
| Extension:TextExtracts&lt;br /&gt;
| Information disclosure &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61655, CVE-2025-61656&lt;br /&gt;
| Extension:VisualEditor&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61657&lt;br /&gt;
| Skin:Vector&lt;br /&gt;
| Part of distribution, but disabled by default &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61638&lt;br /&gt;
| Parsoid&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-53625&lt;br /&gt;
| Extension:DynamicPageList &lt;br /&gt;
|Information disclosure&lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-59839&lt;br /&gt;
| Extension:EmbedVideo &lt;br /&gt;
|&lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-54370&lt;br /&gt;
| Extension:DataTransfer, Extension:BlueSpiceExtendedStatistics and Extension:BlueSpiceUEModuleTable2Excel&lt;br /&gt;
|&lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-3277&lt;br /&gt;
|Container &amp;lt;code&amp;gt;bluespice/database&amp;lt;/code&amp;gt; &lt;br /&gt;
|&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |not affected&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-purple-bg&amp;quot; |affected&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-6965&lt;br /&gt;
|Container &amp;lt;code&amp;gt;bluespice/database&amp;lt;/code&amp;gt; &lt;br /&gt;
|&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |not affected&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-purple-bg&amp;quot; |affected&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2024-56171&lt;br /&gt;
|Container &amp;lt;code&amp;gt;bluespice/database&amp;lt;/code&amp;gt; &lt;br /&gt;
|&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |not affected&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-purple-bg&amp;quot; |affected&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Impact assessment ==&lt;br /&gt;
{{Textbox|boxtype=note|header=|text=This section only lists vulnerabilities that has been identified as affecting BlueSpice version 4 or 5|icon=yes}}&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
! CVE !! Assessment !! Mitigation &lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61634&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61636&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61637&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61638&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61639&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61640&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61641&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61642&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61643&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61646&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-11173&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61653&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61655&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-61656&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61638&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-53625&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-59839&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-54370&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-3277&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-6965&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2024-56171&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
&lt;br /&gt;
* Update to BlueSpice 5.1.3&lt;br /&gt;
* Update to BlueSpice 4.5.7&lt;br /&gt;
{{Textbox|boxtype=important|header=False positives in 4.5.7 audit|text=Audit tools may detect &amp;lt;code&amp;gt;CVE-2025-53625&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;CVE-2025-59839&amp;lt;/code&amp;gt; in builds of &amp;lt;code&amp;gt;4.5.7&amp;lt;/code&amp;gt;. This is because there are no fixed compatible versions of the affected components available. The versions bundled with the &amp;lt;code&amp;gt;4.5.7&amp;lt;/code&amp;gt; release &#039;&#039;&#039;do contain the neccessary fixes&#039;&#039;&#039; for those issues as backports. It is just their version numbers are not known to be fixed by the vulnerability databases.|icon=yes}}&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
Reported by various community members&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-06&amp;diff=13219</id>
		<title>Security:Security Advisories/BSSA-2025-06</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-06&amp;diff=13219"/>
		<updated>2025-10-27T07:21:07Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2025-10-22&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
|&lt;br /&gt;
* Current LTS version 5.1, &amp;lt; 5.1.3&lt;br /&gt;
* Legacy version 4.5, &amp;lt; 4.5.7&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|&lt;br /&gt;
* 5.1.3&lt;br /&gt;
* 4.5.7&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2024-56171 CVE-2024-56171]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-11173 CVE-2025-11173]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-3277 CVE-2025-3277]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-53625 CVE-2025-53625]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-54370 CVE-2025-54370]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-59839 CVE-2025-59839]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61634 CVE-2025-61634]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61635 CVE-2025-61635]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61636 CVE-2025-61636]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61637 CVE-2025-61637]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61638 CVE-2025-61638]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61639 CVE-2025-61639]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61640 CVE-2025-61640]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61641 CVE-2025-61641]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61642 CVE-2025-61642]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61643 CVE-2025-61643]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61646 CVE-2025-61646]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61652 CVE-2025-61652]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-11175 CVE-2025-11175]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61653 CVE-2025-61653]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61655 CVE-2025-61655]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61655 CVE-2025-61655]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61656 CVE-2025-61656]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61656 CVE-2025-61656]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-61657 CVE-2025-61657]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2025-6965 CVE-2025-6965]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Problem ==&lt;br /&gt;
{{Textbox|boxtype=note|header=|text=The following list only contains items from [https://lists.wikimedia.org/hyperkitty/list/mediawiki-announce@lists.wikimedia.org/thread/TF4S5Y2324UIW3GOBPBWD2MSUSROG5GH/ MediaWiki 1.43.5 und 1.39.15], that are actually part of the BlueSpice distribution.|icon=yes}}&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! CVE !! Component !! Type of vulnerability !! BlueSpice 5 !! BlueSpice 4&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61634&lt;br /&gt;
| MediaWiki Core / REST&lt;br /&gt;
| Denial Of Service &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61636&lt;br /&gt;
| MediaWiki Core / HTMLForm&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61637&lt;br /&gt;
| MediaWiki Core / Preview&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61638&lt;br /&gt;
| MediaWiki Core / Various&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61639&lt;br /&gt;
| MediaWiki Core / RecentChanges&lt;br /&gt;
| Information Disclosure &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61640&lt;br /&gt;
| MediaWiki Core / RecentChanges&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61641&lt;br /&gt;
| MediaWiki Core / ActionAPI&lt;br /&gt;
| Denial Of Service &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61642&lt;br /&gt;
| MediaWiki Core / HTMLForm&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61643&lt;br /&gt;
| MediaWiki Core / RecentChanges (Feed)&lt;br /&gt;
| Information Disclosure &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61646&lt;br /&gt;
| MediaWiki Core / RecentChanges+Watchlist&lt;br /&gt;
| Information Disclosure &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61635&lt;br /&gt;
| Extension:ConfirmEdit&lt;br /&gt;
| Part of distribution, but disabled by default &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61652, CVE-2025-11175&lt;br /&gt;
| Extension:DiscussionTools&lt;br /&gt;
| Information Disclosure ( Part of distribution, but disabled by default )&lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-11173&lt;br /&gt;
| Extension:OATHAuth&lt;br /&gt;
| Bypass authn at content check &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61653&lt;br /&gt;
| Extension:TextExtracts&lt;br /&gt;
| Information disclosure &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61655, CVE-2025-61656&lt;br /&gt;
| Extension:VisualEditor&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61657&lt;br /&gt;
| Skin:Vector&lt;br /&gt;
| Part of distribution, but disabled by default &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61638&lt;br /&gt;
| Parsoid&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-53625&lt;br /&gt;
| Extension:DynamicPageList &lt;br /&gt;
|Information disclosure&lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-59839&lt;br /&gt;
| Extension:EmbedVideo &lt;br /&gt;
|&lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-54370&lt;br /&gt;
| Extension:DataTransfer, Extension:BlueSpiceExtendedStatistics and Extension:BlueSpiceUEModuleTable2Excel&lt;br /&gt;
|&lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-3277&lt;br /&gt;
|Container &amp;lt;code&amp;gt;bluespice/database&amp;lt;/code&amp;gt; &lt;br /&gt;
|&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |not affected&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-purple-bg&amp;quot; |affected&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-6965&lt;br /&gt;
|Container &amp;lt;code&amp;gt;bluespice/database&amp;lt;/code&amp;gt; &lt;br /&gt;
|&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |not affected&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-purple-bg&amp;quot; |affected&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2024-56171&lt;br /&gt;
|Container &amp;lt;code&amp;gt;bluespice/database&amp;lt;/code&amp;gt; &lt;br /&gt;
|&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |not affected&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-purple-bg&amp;quot; |affected&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Impact assessment ==&lt;br /&gt;
{{Textbox|boxtype=note|header=|text=This section only lists vulnerabilities that has been identified as affecting BlueSpice version 4 or 5|icon=yes}}&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
! CVE !! Assessment !! Mitigation &lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61634&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61636&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61637&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61638&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61639&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61640&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61641&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61642&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61643&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61646&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-11173&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61653&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61655&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-61656&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61638&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-53625&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-59839&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-54370&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-3277&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-6965&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2024-56171&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
&lt;br /&gt;
* Update to BlueSpice 5.1.3&lt;br /&gt;
* Update to BlueSpice 4.5.7&lt;br /&gt;
{{Textbox|boxtype=important|header=False positives in 4.5.7 audit|text=Audit tools may detect &amp;lt;code&amp;gt;CVE-2025-53625&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;CVE-2025-59839&amp;lt;/code&amp;gt; in builds of &amp;lt;code&amp;gt;4.5.7&amp;lt;/code&amp;gt;. This is because there are no fixed compatible versions of the affected components available. The versions bundled with the &amp;lt;code&amp;gt;4.5.7&amp;lt;/code&amp;gt; release &#039;&#039;&#039;do contain the neccessary fixes&#039;&#039;&#039; for those issues as backports. It is just their version numbers are not known to be fixed by the vulnerability databases.|icon=yes}}&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
Reported by various community members&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-06&amp;diff=13218</id>
		<title>Security:Security Advisories/BSSA-2025-06</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-06&amp;diff=13218"/>
		<updated>2025-10-27T07:15:23Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2025-10-22&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
|&lt;br /&gt;
* Current LTS version 5.1, &amp;lt; 5.1.3&lt;br /&gt;
* Legacy version 4.5, &amp;lt; 4.5.7&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|&lt;br /&gt;
* 5.1.3&lt;br /&gt;
* 4.5.7&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Problem ==&lt;br /&gt;
{{Textbox|boxtype=note|header=|text=The following list only contains items from [https://lists.wikimedia.org/hyperkitty/list/mediawiki-announce@lists.wikimedia.org/thread/TF4S5Y2324UIW3GOBPBWD2MSUSROG5GH/ MediaWiki 1.43.5 und 1.39.15], that are actually part of the BlueSpice distribution.|icon=yes}}&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! CVE !! Component !! Type of vulnerability !! BlueSpice 5 !! BlueSpice 4&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61634&lt;br /&gt;
| MediaWiki Core / REST&lt;br /&gt;
| Denial Of Service &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61636&lt;br /&gt;
| MediaWiki Core / HTMLForm&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61637&lt;br /&gt;
| MediaWiki Core / Preview&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61638&lt;br /&gt;
| MediaWiki Core / Various&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61639&lt;br /&gt;
| MediaWiki Core / RecentChanges&lt;br /&gt;
| Information Disclosure &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61640&lt;br /&gt;
| MediaWiki Core / RecentChanges&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61641&lt;br /&gt;
| MediaWiki Core / ActionAPI&lt;br /&gt;
| Denial Of Service &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61642&lt;br /&gt;
| MediaWiki Core / HTMLForm&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61643&lt;br /&gt;
| MediaWiki Core / RecentChanges (Feed)&lt;br /&gt;
| Information Disclosure &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61646&lt;br /&gt;
| MediaWiki Core / RecentChanges+Watchlist&lt;br /&gt;
| Information Disclosure &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61635&lt;br /&gt;
| Extension:ConfirmEdit&lt;br /&gt;
| Part of distribution, but disabled by default &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61652, CVE-2025-11175&lt;br /&gt;
| Extension:DiscussionTools&lt;br /&gt;
| Information Disclosure ( Part of distribution, but disabled by default )&lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-11173&lt;br /&gt;
| Extension:OATHAuth&lt;br /&gt;
| Bypass authn at content check &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61653&lt;br /&gt;
| Extension:TextExtracts&lt;br /&gt;
| Information disclosure &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61655, CVE-2025-61656&lt;br /&gt;
| Extension:VisualEditor&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61657&lt;br /&gt;
| Skin:Vector&lt;br /&gt;
| Part of distribution, but disabled by default &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61638&lt;br /&gt;
| Parsoid&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-53625&lt;br /&gt;
| Extension:DynamicPageList &lt;br /&gt;
|Information disclosure&lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-59839&lt;br /&gt;
| Extension:EmbedVideo &lt;br /&gt;
|&lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-54370&lt;br /&gt;
| Extension:DataTransfer, Extension:BlueSpiceExtendedStatistics and Extension:BlueSpiceUEModuleTable2Excel&lt;br /&gt;
|&lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-3277&lt;br /&gt;
|Container &amp;lt;code&amp;gt;bluespice/database&amp;lt;/code&amp;gt; &lt;br /&gt;
|&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |not affected&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-purple-bg&amp;quot; |affected&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-6965&lt;br /&gt;
|Container &amp;lt;code&amp;gt;bluespice/database&amp;lt;/code&amp;gt; &lt;br /&gt;
|&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |not affected&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-purple-bg&amp;quot; |affected&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2024-56171&lt;br /&gt;
|Container &amp;lt;code&amp;gt;bluespice/database&amp;lt;/code&amp;gt; &lt;br /&gt;
|&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |not affected&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-purple-bg&amp;quot; |affected&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Impact assessment ==&lt;br /&gt;
{{Textbox|boxtype=note|header=|text=This section only lists vulnerabilities that has been identified as affecting BlueSpice version 4 or 5|icon=yes}}&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
! CVE !! Assessment !! Mitigation &lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61634&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61636&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61637&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61638&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61639&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61640&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61641&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61642&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61643&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61646&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-11173&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61653&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61655&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-61656&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61638&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-53625&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-59839&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-54370&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-3277&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-6965&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2024-56171&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
&lt;br /&gt;
* Update to BlueSpice 5.1.3&lt;br /&gt;
* Update to BlueSpice 4.5.7&lt;br /&gt;
{{Textbox|boxtype=important|header=False positives in 4.5.7 audit|text=Audit tools may detect &amp;lt;code&amp;gt;CVE-2025-53625&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;CVE-2025-59839&amp;lt;/code&amp;gt; in builds of &amp;lt;code&amp;gt;4.5.7&amp;lt;/code&amp;gt;. This is because there are no fixed compatible versions of the affected components available. The versions bundled with the &amp;lt;code&amp;gt;4.5.7&amp;lt;/code&amp;gt; release &#039;&#039;&#039;do contain the neccessary fixes&#039;&#039;&#039; for those issues as backports. It is just their version numbers are not known to be fixed by the vulnerability databases.|icon=yes}}&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
Reported by various community members&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-06&amp;diff=13217</id>
		<title>Security:Security Advisories/BSSA-2025-06</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-06&amp;diff=13217"/>
		<updated>2025-10-27T07:14:53Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2025-10-22&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
|&lt;br /&gt;
* Current LTS version 5.1, &amp;lt; 5.1.3&lt;br /&gt;
* Legacy version 4.5, &amp;lt; 4.5.7&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|&lt;br /&gt;
* 5.1.3&lt;br /&gt;
* 4.5.7&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Problem ==&lt;br /&gt;
{{Textbox|boxtype=note|header=|text=The following list only contains items from [https://lists.wikimedia.org/hyperkitty/list/mediawiki-announce@lists.wikimedia.org/thread/TF4S5Y2324UIW3GOBPBWD2MSUSROG5GH/ MediaWiki 1.43.5 und 1.39.15], that are actually part of the BlueSpice distribution.|icon=yes}}&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! CVE !! Component !! Type of vulnerability !! BlueSpice 5 !! BlueSpice 4&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61634&lt;br /&gt;
| MediaWiki Core / REST&lt;br /&gt;
| Denial Of Service &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61636&lt;br /&gt;
| MediaWiki Core / HTMLForm&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61637&lt;br /&gt;
| MediaWiki Core / Preview&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61638&lt;br /&gt;
| MediaWiki Core / Various&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61639&lt;br /&gt;
| MediaWiki Core / RecentChanges&lt;br /&gt;
| Information Disclosure &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61640&lt;br /&gt;
| MediaWiki Core / RecentChanges&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61641&lt;br /&gt;
| MediaWiki Core / ActionAPI&lt;br /&gt;
| Denial Of Service &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61642&lt;br /&gt;
| MediaWiki Core / HTMLForm&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61643&lt;br /&gt;
| MediaWiki Core / RecentChanges (Feed)&lt;br /&gt;
| Information Disclosure &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61646&lt;br /&gt;
| MediaWiki Core / RecentChanges+Watchlist&lt;br /&gt;
| Information Disclosure &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61635&lt;br /&gt;
| Extension:ConfirmEdit&lt;br /&gt;
| Part of distribution, but disabled by default &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61652, CVE-2025-11175&lt;br /&gt;
| Extension:DiscussionTools&lt;br /&gt;
| Information Disclosure ( Part of distribution, but disabled by default )&lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-11173&lt;br /&gt;
| Extension:OATHAuth&lt;br /&gt;
| Bypass authn at content check &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61653&lt;br /&gt;
| Extension:TextExtracts&lt;br /&gt;
| Information disclosure &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61655, CVE-2025-61656&lt;br /&gt;
| Extension:VisualEditor&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61657&lt;br /&gt;
| Skin:Vector&lt;br /&gt;
| Part of distribution, but disabled by default &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61638&lt;br /&gt;
| Parsoid&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-53625&lt;br /&gt;
| Extension:DynamicPageList &lt;br /&gt;
|Information disclosure&lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-59839&lt;br /&gt;
| Extension:EmbedVideo &lt;br /&gt;
|&lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-54370&lt;br /&gt;
| Extension:DataTransfer, Extension:BlueSpiceExtendedStatistics and Extension:BlueSpiceUEModuleTable2Excel&lt;br /&gt;
|&lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-3277&lt;br /&gt;
|Container &amp;lt;code&amp;gt;bluespice/database&amp;lt;/code&amp;gt; &lt;br /&gt;
|&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |not affected&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-purple-bg&amp;quot; |affected&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-6965&lt;br /&gt;
|Container &amp;lt;code&amp;gt;bluespice/database&amp;lt;/code&amp;gt; &lt;br /&gt;
|&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |not affected&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-purple-bg&amp;quot; |affected&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2024-56171&lt;br /&gt;
|Container &amp;lt;code&amp;gt;bluespice/database&amp;lt;/code&amp;gt; &lt;br /&gt;
|&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-green-bg&amp;quot; |not affected&lt;br /&gt;
| style=&amp;quot;&amp;quot; class=&amp;quot;col-purple-bg&amp;quot; |affected&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Impact assessment ==&lt;br /&gt;
{{Textbox|boxtype=note|header=|text=This section only lists vulnerabilities that has been identified as affecting BlueSpice version 4 or 5|icon=yes}}&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! CVE !! Assessment !! Mitigation &lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61634&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61636&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61637&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61638&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61639&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61640&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61641&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61642&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61643&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61646&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-11173&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61653&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61655&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-61656&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61638&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-53625&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-59839&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-54370&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-3277&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2025-6965&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|CVE-2024-56171&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
&lt;br /&gt;
* Update to BlueSpice 5.1.3&lt;br /&gt;
* Update to BlueSpice 4.5.7&lt;br /&gt;
{{Textbox|boxtype=important|header=False positives in 4.5.7 audit|text=Audit tools may detect &amp;lt;code&amp;gt;CVE-2025-53625&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;CVE-2025-59839&amp;lt;/code&amp;gt; in builds of &amp;lt;code&amp;gt;4.5.7&amp;lt;/code&amp;gt;. This is because there are no fixed compatible versions of the affected components available. The versions bundled with the &amp;lt;code&amp;gt;4.5.7&amp;lt;/code&amp;gt; release &#039;&#039;&#039;do contain the neccessary fixes&#039;&#039;&#039; for those issues as backports. It is just their version numbers are not known to be fixed by the vulnerability databases.|icon=yes}}&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
Reported by various community members&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-06&amp;diff=13216</id>
		<title>Security:Security Advisories/BSSA-2025-06</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-06&amp;diff=13216"/>
		<updated>2025-10-27T07:03:00Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2025-10-22&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
|&lt;br /&gt;
* Current LTS version 5.1, &amp;lt; 5.1.3&lt;br /&gt;
* Legacy version 4.5, &amp;lt; 4.5.7&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|&lt;br /&gt;
* 5.1.3&lt;br /&gt;
* 4.5.7&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Problem ==&lt;br /&gt;
{{Textbox|boxtype=note|header=|text=The following list only contains items from [https://lists.wikimedia.org/hyperkitty/list/mediawiki-announce@lists.wikimedia.org/thread/TF4S5Y2324UIW3GOBPBWD2MSUSROG5GH/ MediaWiki 1.43.5 und 1.39.15], that are actually part of the BlueSpice distribution.|icon=yes}}&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! CVE !! Component !! Type of vulnerability !! BlueSpice 5 !! BlueSpice 4&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61634&lt;br /&gt;
| Core/REST&lt;br /&gt;
| Denial Of Service &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61636&lt;br /&gt;
| Core/HTMLForm&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61637&lt;br /&gt;
| Core/Preview&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61638&lt;br /&gt;
| Core/Various&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61639&lt;br /&gt;
| Core/RecentChanges&lt;br /&gt;
| Information Disclosure &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61640&lt;br /&gt;
| Core/RecentChanges&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61641&lt;br /&gt;
| Core/ActionAPI&lt;br /&gt;
| Denial Of Service &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61642&lt;br /&gt;
| Core/HTMLForm&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61643&lt;br /&gt;
| Core/RecentChanges (Feed)&lt;br /&gt;
| Information Disclosure &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61646&lt;br /&gt;
| Core/RecentChanges+Watchlist&lt;br /&gt;
| Information Disclosure &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61635&lt;br /&gt;
| Extension:ConfirmEdit&lt;br /&gt;
| Part of distribution, but disabled by default &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61652, CVE-2025-11175&lt;br /&gt;
| Extension:DiscussionTools&lt;br /&gt;
| Information Disclosure ( Part of distribution, but disabled by default )&lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-11173&lt;br /&gt;
| Extension:OATHAuth&lt;br /&gt;
| Bypass authn at content check &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61653&lt;br /&gt;
| Extension:TextExtracts&lt;br /&gt;
| Information Disclosure &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61655, CVE-2025-61656&lt;br /&gt;
| Extension:VisualEditor&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61657&lt;br /&gt;
| Skin:Vector&lt;br /&gt;
| Part of distribution, but disabled by default &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected &lt;br /&gt;
| class=&amp;quot;col-green-bg&amp;quot; | not affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61638&lt;br /&gt;
| Parsoid&lt;br /&gt;
| XSS &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-53625&lt;br /&gt;
| Extension:DynamicPageList &lt;br /&gt;
|&lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-59839&lt;br /&gt;
| Extension:EmbedVideo &lt;br /&gt;
|&lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-54370&lt;br /&gt;
| Extension:DataTransfer, Extension:BlueSpiceExtendedStatistics and Extension:BlueSpiceUEModuleTable2Excel&lt;br /&gt;
|&lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected &lt;br /&gt;
| class=&amp;quot;col-purple-bg&amp;quot; | affected&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Impact assessment ==&lt;br /&gt;
TDB&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
&lt;br /&gt;
* Update to BlueSpice 5.1.3&lt;br /&gt;
* Update to BlueSpice 4.5.7&lt;br /&gt;
{{Textbox|boxtype=important|header=False positives in 4.5.7 audit|text=Audit tools may detect &amp;lt;code&amp;gt;CVE-2025-53625&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;CVE-2025-59839&amp;lt;/code&amp;gt; in builds of &amp;lt;code&amp;gt;4.5.7&amp;lt;/code&amp;gt;. This is because there are no fixed compatible versions of the affected components available. The versions bundled with the &amp;lt;code&amp;gt;4.5.7&amp;lt;/code&amp;gt; release &#039;&#039;&#039;do contain the neccessary fixes&#039;&#039;&#039; for those issues as backports. It is just their version numbers are not known to be fixed by the vulnerability databases.|icon=yes}}&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
Reported by various community members&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-06&amp;diff=13215</id>
		<title>Security:Security Advisories/BSSA-2025-06</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-06&amp;diff=13215"/>
		<updated>2025-10-26T11:13:18Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2025-10-22&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
|&lt;br /&gt;
* Current LTS version 5.1, &amp;lt; 5.1.3&lt;br /&gt;
* Legacy version 4.5, &amp;lt; 4.5.7&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|&lt;br /&gt;
* 5.1.3&lt;br /&gt;
* 4.5.7&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Problem ==&lt;br /&gt;
{{Textbox|boxtype=note|header=|text=The following list only contains items from [https://lists.wikimedia.org/hyperkitty/list/mediawiki-announce@lists.wikimedia.org/thread/TF4S5Y2324UIW3GOBPBWD2MSUSROG5GH/ MediaWiki 1.43.5 und 1.39.15] That are actually part of the BlueSpice distribution.|icon=yes}}&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! CVE !! Component !! BlueSpice 5 affected !! BlueSpice 4 affected&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61634 || Core/REST → Denial Of Service || ✅ || ❌&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61636 || Core/HTMLForm → XSS || ✅ || ❌&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61637 || Core/Preview → XSS || ✅ || ❌&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61638 || Core/Various → XSS || ✅ || ✅&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61639 || Core/RecentChanges → Information Disclosure || ✅ || ✅&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61640 || Core/RecentChanges → XSS || ✅ || ✅&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61641 || Core/ActionAPI → Denial Of Service || ✅ || ✅&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61642 || Core/HTMLForm → XSS || ✅ || ❌&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61643 || Core/RecentChanges (Feed) → Information Disclosure || ✅ || ✅&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61646 || Core/RecentChanges+Watchlist → Information Disclosure || ✅ || ✅&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61635 || Extension:ConfirmEdit → Part of distribution, but disabled by default || ❌ || ❌&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61652, CVE-2025-11175 || Extension:DiscussionTools → Information Disclosure → Part of distribution, but disabled by default || ❌ || ❌&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-11173 || Extension:OATHAuth → Bypass authn at content check || ✅ || ✅&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61653 || Extension:TextExtracts → Information Disclosure || ✅ || ✅&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61655, CVE-2025-61656 || Extension:VisualEditor → XSS || ✅ || ✅&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61657 || Skin:Vector → Part of distribution, but disabled by default || ❌ || ❌&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-61638 || Parsoid → XSS || ✅ || ✅&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-53625 || Extension:DynamicPageList || ✅ || ✅&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-59839 || Extension:EmbedVideo || ✅ || ✅&lt;br /&gt;
|-&lt;br /&gt;
| CVE-2025-54370 || Extension:DataTransfer, Extension:BlueSpiceExtendedStatistics and Extension:BlueSpiceUEModuleTable2Excel || ✅ || ✅&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Impact assessment ==&lt;br /&gt;
TDB&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
&lt;br /&gt;
* Update to BlueSpice 5.1.3&lt;br /&gt;
* Update to BlueSpice 4.5.7&lt;br /&gt;
{{Textbox|boxtype=important|header=False positives in 4.5.7 audit|text=Audit tools may detect &amp;lt;code&amp;gt;CVE-2025-53625&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;CVE-2025-59839&amp;lt;/code&amp;gt; in builds of &amp;lt;code&amp;gt;4.5.7&amp;lt;/code&amp;gt;. This is because there are no fixed compatible versions of the affected components available. The versions bundled with the &amp;lt;code&amp;gt;4.5.7&amp;lt;/code&amp;gt; release &#039;&#039;&#039;do contain the neccessary fixes&#039;&#039;&#039; for those issues as backports. It is just their version numbers are not known to be fixed by the vulnerability databases.|icon=yes}}&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
Reported by various community members&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-06&amp;diff=13214</id>
		<title>Security:Security Advisories/BSSA-2025-06</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-06&amp;diff=13214"/>
		<updated>2025-10-26T11:05:41Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2025-10-22&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
|&lt;br /&gt;
* Current LTS version 5.1, &amp;lt; 5.1.3&lt;br /&gt;
* Legacy version 4.5, &amp;lt; 4.5.7&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|&lt;br /&gt;
* 5.1.3&lt;br /&gt;
* 4.5.7&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Problem ==&lt;br /&gt;
&lt;br /&gt;
* CVE-2025-61634: Core/REST → Denial Of Service → BlueSpice 5 affected&lt;br /&gt;
* CVE-2025-61636: Core/HTMLForm → XSS → BlueSpice 5 affected&lt;br /&gt;
* CVE-2025-61637: Core/Preview →XSS → BlueSpice 5 affected&lt;br /&gt;
* CVE-2025-61638: Core/Various →XSS → BlueSpice 5 affected, BlueSpice 4 affected&lt;br /&gt;
* CVE-2025-61639: Core/RecentChanges → Information Disclosure → BlueSpice 5 affected, BlueSpice 4 affected&lt;br /&gt;
* CVE-2025-61640: Core/RecentChanges → XSS  → BlueSpice 5 affected, BlueSpice 4 affected&lt;br /&gt;
* CVE-2025-61641: Core/ActionAPI → Denial Of Service → BlueSpice 5 affected, BlueSpice 4 affected&lt;br /&gt;
* CVE-2025-61642: Core/HTMLForm → XSS → BlueSpice 5 affected&lt;br /&gt;
* CVE-2025-61643: Core/RecentChanges (Feed) → Information Disclosure → BlueSpice 5 affected, BlueSpice 4 affected&lt;br /&gt;
* CVE-2025-61646: Core/RecentChanges+Watchlist → Information Disclosure → BlueSpice 5 affected, BlueSpice 4 affected&lt;br /&gt;
* CVE-2025-61635: Extension:ConfirmEdit → Part of distribution, but disabled by default; Not affected&lt;br /&gt;
* CVE-2025-61652, CVE-2025-11175: Extension:DiscussionTools → Information Disclosure → Part of distribution, but disabled by default → Not affected&lt;br /&gt;
* CVE-2025-11173: Extension:OATHAuth → Bypass authn at content check  → BlueSpice 5 affected, BlueSpice 4 affected&lt;br /&gt;
* CVE-2025-61653: Extension:TextExtracts → Information Disclosure → BlueSpice 5 affected, BlueSpice 4 affected&lt;br /&gt;
* CVE-2025-61655, CVE-2025-61656: Extension:VisualEditor →XSS  → BlueSpice 5 affected, BlueSpice 4 affected&lt;br /&gt;
* CVE-2025-61657: Skin:Vector - Part of distribution, but disabled by default; Not affected&lt;br /&gt;
* CVE-2025-61638: Parsoid → XSS  → BlueSpice 5 affected, BlueSpice 4 affected&lt;br /&gt;
* CVE-2025-53625: Extension:DynamicPageList → BlueSpice 5 affected, BlueSpice 4 affected&lt;br /&gt;
* CVE-2025-59839: Extension:EmbedVideo → BlueSpice 5 affected, BlueSpice 4 affected&lt;br /&gt;
* CVE-2025-54370: Extension:DataTransfer, Extension:BlueSpiceExtendedStatistics and Extension:BlueSpiceUEModuleTable2Excel → BlueSpice 5 affected, BlueSpice 4 affected&lt;br /&gt;
&lt;br /&gt;
== Impact assessment ==&lt;br /&gt;
TDB&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
&lt;br /&gt;
* Update to BlueSpice 5.1.3&lt;br /&gt;
* Update to BlueSpice 4.5.7&lt;br /&gt;
{{Textbox|boxtype=important|header=False positives in 4.5.7 audit|text=Audit tools may detect &amp;lt;code&amp;gt;CVE-2025-53625&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;CVE-2025-59839&amp;lt;/code&amp;gt; in builds of &amp;lt;code&amp;gt;4.5.7&amp;lt;/code&amp;gt;. This is because there are no fixed compatible versions of the affected components available. The versions bundled with the &amp;lt;code&amp;gt;4.5.7&amp;lt;/code&amp;gt; release &#039;&#039;&#039;do contain the neccessary fixes&#039;&#039;&#039; for those issues as backports. It is just their version numbers are not known to be fixed by the vulnerability databases.|icon=yes}}&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
Reported by various community members&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-06&amp;diff=13157</id>
		<title>Security:Security Advisories/BSSA-2025-06</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-06&amp;diff=13157"/>
		<updated>2025-10-20T14:26:28Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2025-10-22&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
| Current LTS version 5.1, &amp;lt; 5.1.3; Legacy version 4.5, &amp;lt; 4.5.7&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|5.1.3; 4.5.7&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Problem ==&lt;br /&gt;
&lt;br /&gt;
* CVE-2025-61634: Core/REST → Denial Of Service → BlueSpice 5 affected&lt;br /&gt;
* CVE-2025-61636: Core/HTMLForm → XSS → BlueSpice 5 affected&lt;br /&gt;
* CVE-2025-61637: Core/Preview →XSS → BlueSpice 5 affected&lt;br /&gt;
* CVE-2025-61638: Core/Various →XSS → BlueSpice 5 affected, BlueSpice 4 affected&lt;br /&gt;
* CVE-2025-61639: Core/RecentChanges → Information Disclosure → BlueSpice 5 affected, BlueSpice 4 affected&lt;br /&gt;
* CVE-2025-61640: Core/RecentChanges → XSS  → BlueSpice 5 affected, BlueSpice 4 affected&lt;br /&gt;
* CVE-2025-61641: Core/ActionAPI → Denial Of Service → BlueSpice 5 affected, BlueSpice 4 affected&lt;br /&gt;
* CVE-2025-61642: Core/HTMLForm → XSS → BlueSpice 5 affected&lt;br /&gt;
* CVE-2025-61643: Core/RecentChanges (Feed) → Information Disclosure → BlueSpice 5 affected, BlueSpice 4 affected&lt;br /&gt;
* CVE-2025-61646: Core/RecentChanges+Watchlist → Information Disclosure → BlueSpice 5 affected, BlueSpice 4 affected&lt;br /&gt;
* CVE-2025-61635: Extension:ConfirmEdit → Part of distribution, but disabled by default; Not affected&lt;br /&gt;
* CVE-2025-61652, CVE-2025-11175: Extension:DiscussionTools → Information Disclosure → Part of distribution, but disabled by default → Not affected&lt;br /&gt;
* CVE-2025-11173: Extension:OATHAuth → Bypass authn at content check  → BlueSpice 5 affected, BlueSpice 4 affected&lt;br /&gt;
* CVE-2025-61653: Extension:TextExtracts → Information Disclosure → BlueSpice 5 affected, BlueSpice 4 affected&lt;br /&gt;
* CVE-2025-61655, CVE-2025-61656: Extension:VisualEditor →XSS  → BlueSpice 5 affected, BlueSpice 4 affected&lt;br /&gt;
* CVE-2025-61657: Skin:Vector - Part of distribution, but disabled by default; Not affected&lt;br /&gt;
* CVE-2025-61638: Parsoid → XSS  → BlueSpice 5 affected, BlueSpice 4 affected&lt;br /&gt;
* CVE-2025-53625: Extension:DynamicPageList → BlueSpice 5 affected, BlueSpice 4 affected&lt;br /&gt;
* CVE-2025-59839: Extension:EmbedVideo → BlueSpice 5 affected, BlueSpice 4 affected&lt;br /&gt;
* CVE-2025-54370: Extension:DataTransfer, Extension:BlueSpiceExtendedStatistics and Extension:BlueSpiceUEModuleTable2Excel → BlueSpice 5 affected, BlueSpice 4 affected&lt;br /&gt;
&lt;br /&gt;
== Impact assessment ==&lt;br /&gt;
TDB&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
&lt;br /&gt;
* Update to BlueSpice 5.1.3&lt;br /&gt;
* Update to BlueSpice 4.5.7&lt;br /&gt;
{{Textbox|boxtype=important|header=False positives in 4.5.7 audit|text=Audit tools may detect &amp;lt;code&amp;gt;CVE-2025-53625&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;CVE-2025-59839&amp;lt;/code&amp;gt; in builds of &amp;lt;code&amp;gt;4.5.7&amp;lt;/code&amp;gt;. This is because there are no fixed compatible versions of the affected components available. The versions bundled with the &amp;lt;code&amp;gt;4.5.7&amp;lt;/code&amp;gt; release &#039;&#039;&#039;do contain the neccessary fixes&#039;&#039;&#039; for those issues as backports. It is just their version numbers are not known to be fixed by the vulnerability databases.|icon=yes}}&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
Reported by various community members&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-06&amp;diff=13155</id>
		<title>Security:Security Advisories/BSSA-2025-06</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-06&amp;diff=13155"/>
		<updated>2025-10-20T14:14:53Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2025-10-22&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
| Current LTS version 5.1, &amp;lt; 5.1.3; Legacy version 4.5, &amp;lt; 4.5.7&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|5.1.3; 4.5.7&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Problem ==&lt;br /&gt;
&lt;br /&gt;
* CVE-2025-61634: Core/REST → Denial Of Service → BlueSpice 5 affected&lt;br /&gt;
* CVE-2025-61636: Core/HTMLForm → XSS → BlueSpice 5 affected&lt;br /&gt;
* CVE-2025-61637: Core/Preview →XSS → BlueSpice 5 affected&lt;br /&gt;
* CVE-2025-61638: Core/Various →XSS → BlueSpice 5 affected, BlueSpice 4 affected&lt;br /&gt;
* CVE-2025-61639: Core/RecentChanges → Information Disclosure → BlueSpice 5 affected, BlueSpice 4 affected&lt;br /&gt;
* CVE-2025-61640: Core/RecentChanges → XSS  → BlueSpice 5 affected, BlueSpice 4 affected&lt;br /&gt;
* CVE-2025-61641: Core/ActionAPI → Denial Of Service → BlueSpice 5 affected, BlueSpice 4 affected&lt;br /&gt;
* CVE-2025-61642: Core/HTMLForm → XSS → BlueSpice 5 affected&lt;br /&gt;
* CVE-2025-61643: Core/RecentChanges (Feed) → Information Disclosure → BlueSpice 5 affected, BlueSpice 4 affected&lt;br /&gt;
* CVE-2025-61646: Core/RecentChanges+Watchlist → Information Disclosure → BlueSpice 5 affected, BlueSpice 4 affected&lt;br /&gt;
* CVE-2025-61635: Extension:ConfirmEdit → Part of distribution, but disabled by default; Not affected&lt;br /&gt;
* CVE-2025-61652, CVE-2025-11175: Extension:DiscussionTools → Information Disclosure → Part of distribution, but disabled by default → Not affected&lt;br /&gt;
* CVE-2025-11173: Extension:OATHAuth → Bypass authn at content check  → BlueSpice 5 affected, BlueSpice 4 affected&lt;br /&gt;
* CVE-2025-61653: Extension:TextExtracts → Information Disclosure → BlueSpice 5 affected, BlueSpice 4 affected&lt;br /&gt;
* CVE-2025-61655, CVE-2025-61656: Extension:VisualEditor →XSS  → BlueSpice 5 affected, BlueSpice 4 affected&lt;br /&gt;
* CVE-2025-61657: Skin:Vector - Part of distribution, but disabled by default; Not affected&lt;br /&gt;
* CVE-2025-61638: Parsoid → XSS  → BlueSpice 5 affected, BlueSpice 4 affected&lt;br /&gt;
&lt;br /&gt;
== Impact assessment ==&lt;br /&gt;
&lt;br /&gt;
*&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
&lt;br /&gt;
* Update to BlueSpice 5.1.3&lt;br /&gt;
* Update to BlueSpice 4.5.7&lt;br /&gt;
{{Textbox|boxtype=important|header=False positives in 4.5.7 audit|text=Audit tools may detect &amp;lt;code&amp;gt;CVE-2025-53625&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;CVE-2025-59839&amp;lt;/code&amp;gt; in builds of &amp;lt;code&amp;gt;4.5.7&amp;lt;/code&amp;gt;. This is because there are no fixed compatible versions of the affected components available. The versions bundled with the &amp;lt;code&amp;gt;4.5.7&amp;lt;/code&amp;gt; release &#039;&#039;&#039;do contain the neccessary fixes&#039;&#039;&#039; for those issues as backports. It is just their version numbers are not known to be fixed by the vulnerability databases.|icon=yes}}&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
Reported by various community members&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-06&amp;diff=13121</id>
		<title>Security:Security Advisories/BSSA-2025-06</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-06&amp;diff=13121"/>
		<updated>2025-10-20T06:37:06Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2025-10-22&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
| Current LTS version 5.1, &amp;lt; 5.1.3; Legacy version 4.5, &amp;lt; 4.5.7&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|5.1.3; 4.5.7&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Problem ==&lt;br /&gt;
&lt;br /&gt;
*&lt;br /&gt;
&lt;br /&gt;
== Impact assessment ==&lt;br /&gt;
&lt;br /&gt;
*&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
&lt;br /&gt;
* Update to BlueSpice 5.1.3&lt;br /&gt;
* Update to BlueSpice 4.5.7&lt;br /&gt;
{{Textbox|boxtype=important|header=False positives in 4.5.7 audit|text=Audit tools may detect &amp;lt;code&amp;gt;CVE-2025-53625&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;CVE-2025-59839&amp;lt;/code&amp;gt; in builds of &amp;lt;code&amp;gt;4.5.7&amp;lt;/code&amp;gt;. This is because there are no fixed compatible versions of the affected components available. The versions bundled with the &amp;lt;code&amp;gt;4.5.7&amp;lt;/code&amp;gt; release &#039;&#039;&#039;do contain the neccessary fixes&#039;&#039;&#039; for those issues as backports. It is just their version numbers are not known to be fixed by the vulnerability databases.|icon=yes}}&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
Reported by various community members&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-06&amp;diff=13120</id>
		<title>Security:Security Advisories/BSSA-2025-06</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-06&amp;diff=13120"/>
		<updated>2025-10-20T06:29:14Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: Created page with &amp;quot;{| class=&amp;quot;wikitable&amp;quot; |+ ! ! |- |Date |2025-09-19 |- |Severity |Medium |- |Affected | Current LTS version 5.1, &amp;lt; 5.1.2 |- |Fixed in |5.1.2 |- |CVE | [https://www.cve.org/CVERecord?id=CVE-2025-46703 CVE-2025-46703], [https://www.cve.org/CVERecord?id=CVE-2025-48007 CVE-2025-48007], [https://www.cve.org/CVERecord?id=CVE-2025-57880 CVE-2025-57880], [https://www.cve.org/CVERecord?id=CVE-2025-58114 CVE-2025-58114] |}  == Problem ==  * XSS in Extension:AtMentions * XSS in Extens...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2025-09-19&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|Medium&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
| Current LTS version 5.1, &amp;lt; 5.1.2&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|5.1.2&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-46703 CVE-2025-46703], [https://www.cve.org/CVERecord?id=CVE-2025-48007 CVE-2025-48007], [https://www.cve.org/CVERecord?id=CVE-2025-57880 CVE-2025-57880], [https://www.cve.org/CVERecord?id=CVE-2025-58114 CVE-2025-58114]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Problem ==&lt;br /&gt;
&lt;br /&gt;
* XSS in Extension:AtMentions&lt;br /&gt;
* XSS in Extension:BlueSpiceAvatars&lt;br /&gt;
* XSS in Extension:BlueSpiceWhoIsOnline&lt;br /&gt;
* XSS in Extension:CognitiveProcessDesigner&lt;br /&gt;
&lt;br /&gt;
== Impact assessment ==&lt;br /&gt;
&lt;br /&gt;
* Extension:AtMentions, Extension:BlueSpiceAvatars, Extension:BlueSpiceWhoIsOnline - A logged in user can execute malicious JavaScript on other users clients and therefore e.g. hijack sessions&lt;br /&gt;
* Extension:CognitiveProcessDesigner - A user with edit permissions can execute malicious JavaScript on other users clients and therefore e.g. hijack sessions&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
Update to BlueSpice 5.1.2&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
Reported by [https://github.com/SomeMWDev/ SomeRandomDeveloper]&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories&amp;diff=12990</id>
		<title>Security:Security Advisories</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories&amp;diff=12990"/>
		<updated>2025-10-07T06:06:29Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;width:100%;&amp;quot;&lt;br /&gt;
! style=&amp;quot;&amp;quot; |Release name&lt;br /&gt;
! style=&amp;quot;&amp;quot; |Release date&lt;br /&gt;
! style=&amp;quot;&amp;quot; |Title&lt;br /&gt;
! style=&amp;quot;&amp;quot; |References&lt;br /&gt;
! style=&amp;quot;&amp;quot; |Summary&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2025-05|BSSA-2025-05]]&lt;br /&gt;
|2025-09-19&lt;br /&gt;
|XSS in Extension:AtMentions, Extension:BlueSpiceAvatars, Extension:BlueSpiceWhoIsOnline and Extension:CognitiveProcessDesigner&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2025-46703 CVE-2025-46703], [https://www.cve.org/CVERecord?id=CVE-2025-48007 CVE-2025-48007], [https://www.cve.org/CVERecord?id=CVE-2025-57880 CVE-2025-57880], [https://www.cve.org/CVERecord?id=CVE-2025-58114 CVE-2025-58114]&lt;br /&gt;
|Cross-Site Scripting (XSS)&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2025-04|BSSA-2025-04]]&lt;br /&gt;
|2025-09-18&lt;br /&gt;
|Security vulnerabilities in services &amp;lt;code&amp;gt;bluespice/search&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;bluespice/formular&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;bluespice/wiki&amp;lt;/code&amp;gt; &lt;br /&gt;
|[https://nvd.nist.gov/vuln/detail/CVE-2025-54988 CVE-2025-54988], [https://avd.aquasec.com/nvd/2025/cve-2025-7783 CVE-2025-7783], [https://avd.aquasec.com/nvd/cve-2025-58050 CVE-2025-58050], [https://avd.aquasec.com/nvd/cve-2025-49796 CVE-2025-49796]&lt;br /&gt;
|Denial-of-Service, Information Disclosure&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2025-03|BSSA-2025-03]]&lt;br /&gt;
|2025-07-28&lt;br /&gt;
|Security vulnerabilities in Extension:Scribunto, Extension:TabberNeue, Extension:TwoColConflict and Extension:Quiz&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2025-53501 CVE-2025-53501], [https://www.cve.org/CVERecord?id=CVE-2025-53494 CVE-2025-53494], [https://www.cve.org/CVERecord?id=CVE-2025-53093 CVE-2025-53093], [https://www.cve.org/CVERecord?id=CVE-2025-7057 CVE-2025-7057]&lt;br /&gt;
|Information Disclosure, Cross-Site Scripting (XSS)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2025-02|BSSA-2025-02]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2025-04-17&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Security vulnerabilities in Extension:OAuth&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2025-32068 CVE-2025-32068], [https://www.cve.org/CVERecord?id=CVE-2025-32074 CVE-2025-32074]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Allows unauthorized access to the wiki, Cross-Site Scripting (XSS)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2025-01|BSSA-2025-01]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2025-01-20&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Security vulnerabilities in Extension:DataTransfer &lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2025-23081 CVE-2025-23081]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Allows Cross Site Request Forgery, Cross-Site Scripting (XSS)&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2023-02|BSSA-2023-02]]&lt;br /&gt;
|2023-10-30&lt;br /&gt;
|Security vulnerabilities in Extension:BlueSpiceAvatars&lt;br /&gt;
|[https://www.cve.org/cverecord?id=CVE-2023-42431 CVE-2023-42431]&lt;br /&gt;
|Allows Cross-Site Scripting (XSS)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2023-01|BSSA-2023-01]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2023-07-25&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Ghostscript vulnerability&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2023-36664 CVE-2023-36664]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Code can be executed on the server via a manipulated PDF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-08|BSSA-2022-08]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-3895 CVE-2022-3895]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through use of interface elements&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-07|BSSA-2022-07]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-3958 CVE-2022-3958]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through personal menu items&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-06|BSSA-2022-06]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-3893 CVE-2022-3893]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through the custom menu&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-05|BSSA-2022-05]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-42001 CVE-2022-42001]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through the book navigation&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-04|BSSA-2022-04]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-41789 CVE-2022-41789], [https://www.cve.org/CVERecord?id=CVE-2022-41814 CVE-2022-41814], [https://www.cve.org/CVERecord?id=CVE-2022-42000 CVE-2022-42000]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through user preferences&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-03|BSSA-2022-03]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-41611 CVE-2022-41611]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through main navigation&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-02|BSSA-2022-02]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-2511 CVE-2022-2511]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through the &#039;title&#039; parameter&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-01|BSSA-2022-01]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-01-31&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector in Search Center&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-2510 CVE-2022-2510]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |JavaScript in search field is reflected back to the browser.&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories&amp;diff=12921</id>
		<title>Security:Security Advisories</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories&amp;diff=12921"/>
		<updated>2025-09-22T06:31:07Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;width:100%;&amp;quot;&lt;br /&gt;
! style=&amp;quot;&amp;quot; |Release name&lt;br /&gt;
! style=&amp;quot;&amp;quot; |Release date&lt;br /&gt;
! style=&amp;quot;&amp;quot; |Title&lt;br /&gt;
! style=&amp;quot;&amp;quot; |References&lt;br /&gt;
! style=&amp;quot;&amp;quot; |Summary&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2025-05|BSSA-2025-05]]&lt;br /&gt;
|2025-09-19&lt;br /&gt;
|XSS in Extension:AtMentions, Extension:BlueSpiceAvatars, Extension:BlueSpiceWhoIsOnline and Extension:CognitiveProcessDesigner&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2025-46703 CVE-2025-46703], [https://www.cve.org/CVERecord?id=CVE-2025-48007 CVE-2025-48007], [https://www.cve.org/CVERecord?id=CVE-2025-57880 CVE-2025-57880], [https://www.cve.org/CVERecord?id=CVE-2025-58114 CVE-2025-58114]&lt;br /&gt;
|Cross-Site Scripting (XSS)&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2025-04|BSSA-2025-04]]&lt;br /&gt;
|2025-09-18&lt;br /&gt;
|Security vulnerabilities in services &amp;lt;code&amp;gt;bluespice/search&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;bluespice/formular&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;bluespice/wiki&amp;lt;/code&amp;gt; &lt;br /&gt;
|[https://nvd.nist.gov/vuln/detail/CVE-2025-54988 CVE-2025-54988], [https://avd.aquasec.com/nvd/2025/cve-2025-7783 CVE-2025-7783], [https://avd.aquasec.com/nvd/cve-2025-58050 CVE-2025-58050], [https://avd.aquasec.com/nvd/cve-2025-49796 CVE-2025-49796]&lt;br /&gt;
|Denial-of-Service, Information Disclosure&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2025-03|BSSA-2025-03]]&lt;br /&gt;
|2025-07-28&lt;br /&gt;
|Security vulnerabilities in Extension:Scribunto, Extension:TabberNeue, Extension:TwoColConflict and Extension:Quiz&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2025-53501 CVE-2025-53501], [https://www.cve.org/CVERecord?id=CVE-2025-53494 CVE-2025-53494], [https://www.cve.org/CVERecord?id=CVE-2025-53093 CVE-2025-53093], [https://www.cve.org/CVERecord?id=CVE-2025-7057 CVE-2025-7057]&lt;br /&gt;
|Information Disclosure, Cross-Site Scripting (XSS)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2025-02|BSSA-2025-02]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2025-04-17&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Security vulnerabilities in Extension:OAuth&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2025-32068 CVE-2025-32068], [https://www.cve.org/CVERecord?id=CVE-2025-32074 CVE-2025-32074]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Allows unauthorized access to the wiki, Cross-Site Scripting (XSS)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2025-01|BSSA-2025-01]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2025-01-20&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Security vulnerabilities in Extension:DataTransfer &lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2025-23081 CVE-2025-23081]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Allows Cross Site Request Forgery, Cross-Site Scripting (XSS)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2023-01|BSSA-2023-01]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2023-07-25&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Ghostscript vulnerability&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2023-36664 CVE-2023-36664]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Code can be executed on the server via a manipulated PDF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-08|BSSA-2022-08]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-3895 CVE-2022-3895]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through use of interface elements&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-07|BSSA-2022-07]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-3958 CVE-2022-3958]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through personal menu items&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-06|BSSA-2022-06]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-3893 CVE-2022-3893]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through the custom menu&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-05|BSSA-2022-05]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-42001 CVE-2022-42001]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through the book navigation&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-04|BSSA-2022-04]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-41789 CVE-2022-41789], [https://www.cve.org/CVERecord?id=CVE-2022-41814 CVE-2022-41814], [https://www.cve.org/CVERecord?id=CVE-2022-42000 CVE-2022-42000]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through user preferences&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-03|BSSA-2022-03]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-41611 CVE-2022-41611]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through main navigation&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-02|BSSA-2022-02]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-2511 CVE-2022-2511]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through the &#039;title&#039; parameter&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-01|BSSA-2022-01]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-01-31&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector in Search Center&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-2510 CVE-2022-2510]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |JavaScript in search field is reflected back to the browser.&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-05&amp;diff=12920</id>
		<title>Security:Security Advisories/BSSA-2025-05</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-05&amp;diff=12920"/>
		<updated>2025-09-22T06:30:54Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2025-09-19&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|Medium&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
| Current LTS version 5.1, &amp;lt; 5.1.2&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|5.1.2&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-46703 CVE-2025-46703], [https://www.cve.org/CVERecord?id=CVE-2025-48007 CVE-2025-48007], [https://www.cve.org/CVERecord?id=CVE-2025-57880 CVE-2025-57880], [https://www.cve.org/CVERecord?id=CVE-2025-58114 CVE-2025-58114]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Problem ==&lt;br /&gt;
&lt;br /&gt;
* XSS in Extension:AtMentions&lt;br /&gt;
* XSS in Extension:BlueSpiceAvatars&lt;br /&gt;
* XSS in Extension:BlueSpiceWhoIsOnline&lt;br /&gt;
* XSS in Extension:CognitiveProcessDesigner&lt;br /&gt;
&lt;br /&gt;
== Impact assessment ==&lt;br /&gt;
&lt;br /&gt;
* Extension:AtMentions, Extension:BlueSpiceAvatars, Extension:BlueSpiceWhoIsOnline - A logged in user can execute malicious JavaScript on other users clients and therefore e.g. hijack sessions&lt;br /&gt;
* Extension:CognitiveProcessDesigner - A user with edit permissions can execute malicious JavaScript on other users clients and therefore e.g. hijack sessions&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
Update to BlueSpice 5.1.2&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
Reported by [https://github.com/SomeMWDev/ SomeRandomDeveloper]&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories&amp;diff=12919</id>
		<title>Security:Security Advisories</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories&amp;diff=12919"/>
		<updated>2025-09-22T06:27:01Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;width:100%;&amp;quot;&lt;br /&gt;
! style=&amp;quot;&amp;quot; |Release name&lt;br /&gt;
! style=&amp;quot;&amp;quot; |Release date&lt;br /&gt;
! style=&amp;quot;&amp;quot; |Title&lt;br /&gt;
! style=&amp;quot;&amp;quot; |References&lt;br /&gt;
! style=&amp;quot;&amp;quot; |Summary&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2025-05|BSSA-2025-05]]&lt;br /&gt;
|2025-09-19&lt;br /&gt;
|XSS in Extension:AtMentions, Extension:BlueSpiceAvatars, Extension:BlueSpiceWhoIsOnline and Extension:CognitiveProcessDesigner&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2025-46703 CVE-2025-46703], [https://www.cve.org/CVERecord?id=CVE-2025-48007 CVE-2025-48007], [https://www.cve.org/CVERecord?id=CVE-2025-57880 CVE-2025-57880], [https://www.cve.org/CVERecord?id=CVE-CVE-2025-58114 CVE-2025-58114]&lt;br /&gt;
|Cross-Site Scripting (XSS)&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2025-04|BSSA-2025-04]]&lt;br /&gt;
|2025-09-18&lt;br /&gt;
|Security vulnerabilities in services &amp;lt;code&amp;gt;bluespice/search&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;bluespice/formular&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;bluespice/wiki&amp;lt;/code&amp;gt; &lt;br /&gt;
|[https://nvd.nist.gov/vuln/detail/CVE-2025-54988 CVE-2025-54988], [https://avd.aquasec.com/nvd/2025/cve-2025-7783 CVE-2025-7783], [https://avd.aquasec.com/nvd/cve-2025-58050 CVE-2025-58050], [https://avd.aquasec.com/nvd/cve-2025-49796 CVE-2025-49796]&lt;br /&gt;
|Denial-of-Service, Information Disclosure&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2025-03|BSSA-2025-03]]&lt;br /&gt;
|2025-07-28&lt;br /&gt;
|Security vulnerabilities in Extension:Scribunto, Extension:TabberNeue, Extension:TwoColConflict and Extension:Quiz&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2025-53501 CVE-2025-53501], [https://www.cve.org/CVERecord?id=CVE-2025-53494 CVE-2025-53494], [https://www.cve.org/CVERecord?id=CVE-2025-53093 CVE-2025-53093], [https://www.cve.org/CVERecord?id=CVE-2025-7057 CVE-2025-7057]&lt;br /&gt;
|Information Disclosure, Cross-Site Scripting (XSS)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2025-02|BSSA-2025-02]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2025-04-17&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Security vulnerabilities in Extension:OAuth&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2025-32068 CVE-2025-32068], [https://www.cve.org/CVERecord?id=CVE-2025-32074 CVE-2025-32074]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Allows unauthorized access to the wiki, Cross-Site Scripting (XSS)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2025-01|BSSA-2025-01]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2025-01-20&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Security vulnerabilities in Extension:DataTransfer &lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2025-23081 CVE-2025-23081]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Allows Cross Site Request Forgery, Cross-Site Scripting (XSS)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2023-01|BSSA-2023-01]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2023-07-25&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Ghostscript vulnerability&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2023-36664 CVE-2023-36664]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Code can be executed on the server via a manipulated PDF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-08|BSSA-2022-08]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-3895 CVE-2022-3895]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through use of interface elements&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-07|BSSA-2022-07]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-3958 CVE-2022-3958]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through personal menu items&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-06|BSSA-2022-06]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-3893 CVE-2022-3893]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through the custom menu&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-05|BSSA-2022-05]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-42001 CVE-2022-42001]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through the book navigation&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-04|BSSA-2022-04]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-41789 CVE-2022-41789], [https://www.cve.org/CVERecord?id=CVE-2022-41814 CVE-2022-41814], [https://www.cve.org/CVERecord?id=CVE-2022-42000 CVE-2022-42000]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through user preferences&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-03|BSSA-2022-03]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-41611 CVE-2022-41611]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through main navigation&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-02|BSSA-2022-02]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-2511 CVE-2022-2511]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through the &#039;title&#039; parameter&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-01|BSSA-2022-01]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-01-31&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector in Search Center&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-2510 CVE-2022-2510]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |JavaScript in search field is reflected back to the browser.&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-05&amp;diff=12918</id>
		<title>Security:Security Advisories/BSSA-2025-05</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-05&amp;diff=12918"/>
		<updated>2025-09-22T06:26:20Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2025-09-19&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|Medium&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
| Current LTS version 5.1, &amp;lt; 5.1.2&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|5.1.2&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-46703 CVE-2025-46703], [https://www.cve.org/CVERecord?id=CVE-2025-48007 CVE-2025-48007], [https://www.cve.org/CVERecord?id=CVE-2025-57880 CVE-2025-57880], [https://www.cve.org/CVERecord?id=CVE-CVE-2025-58114 CVE-2025-58114]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Problem ==&lt;br /&gt;
&lt;br /&gt;
* XSS in Extension:AtMentions&lt;br /&gt;
* XSS in Extension:BlueSpiceAvatars&lt;br /&gt;
* XSS in Extension:BlueSpiceWhoIsOnline&lt;br /&gt;
* XSS in Extension:CognitiveProcessDesigner&lt;br /&gt;
&lt;br /&gt;
== Impact assessment ==&lt;br /&gt;
&lt;br /&gt;
* Extension:AtMentions, Extension:BlueSpiceAvatars, Extension:BlueSpiceWhoIsOnline - A logged in user can execute malicious JavaScript on other users clients and therefore e.g. hijack sessions&lt;br /&gt;
* Extension:CognitiveProcessDesigner - A user with edit permissions can execute malicious JavaScript on other users clients and therefore e.g. hijack sessions&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
Update to BlueSpice 5.1.2&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
Reported by [https://github.com/SomeMWDev/ SomeRandomDeveloper]&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-05&amp;diff=12917</id>
		<title>Security:Security Advisories/BSSA-2025-05</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-05&amp;diff=12917"/>
		<updated>2025-09-22T06:25:52Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2025-09-19&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|Medium&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
| Current LTS version 5.1, &amp;lt; 5.1.2&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|5.1.2&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-46703 CVE-2025-46703], [https://www.cve.org/CVERecord?id=CVE-2025-48007 CVE-2025-48007], [https://www.cve.org/CVERecord?id=CVE-2025-57880 CVE-2025-57880],[https://www.cve.org/CVERecord?id=CVE-CVE-2025-58114 CVE-2025-58114]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Problem ==&lt;br /&gt;
&lt;br /&gt;
* XSS in Extension:AtMentions&lt;br /&gt;
* XSS in Extension:BlueSpiceAvatars&lt;br /&gt;
* XSS in Extension:BlueSpiceWhoIsOnline&lt;br /&gt;
* XSS in Extension:CognitiveProcessDesigner&lt;br /&gt;
&lt;br /&gt;
== Impact assessment ==&lt;br /&gt;
&lt;br /&gt;
* Extension:AtMentions, Extension:BlueSpiceAvatars, Extension:BlueSpiceWhoIsOnline - A logged in user can execute malicious JavaScript on other users clients and therefore e.g. hijack sessions&lt;br /&gt;
* Extension:CognitiveProcessDesigner - A user with edit permissions can execute malicious JavaScript on other users clients and therefore e.g. hijack sessions&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
Update to BlueSpice 5.1.2&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
Reported by [https://github.com/SomeMWDev/ SomeRandomDeveloper]&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-05&amp;diff=12914</id>
		<title>Security:Security Advisories/BSSA-2025-05</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-05&amp;diff=12914"/>
		<updated>2025-09-19T13:07:07Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2025-09-??&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|TBD&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
| Current LTS version 5.1, &amp;lt; 5.1.2&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|5.1.2&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|&lt;br /&gt;
[https://www.cve.org/CVERecord?id=CVE-2025-46703 CVE-2025-46703], [https://www.cve.org/CVERecord?id=CVE-2025-48007 CVE-2025-48007], [https://www.cve.org/CVERecord?id=CVE-2025-57880 CVE-2025-57880],[https://www.cve.org/CVERecord?id=CVE-2025-57880 CVE-2025-57880]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Problem ==&lt;br /&gt;
&lt;br /&gt;
* XSS in Extension:AtMentions&lt;br /&gt;
* XSS in Extension:BlueSpiceAvatars&lt;br /&gt;
* XSS in Extension:BlueSpiceWhoIsOnline&lt;br /&gt;
* XSS in Extension:CognitiveProcessDesigner&lt;br /&gt;
&lt;br /&gt;
== Impact assessment ==&lt;br /&gt;
&lt;br /&gt;
* Extension:AtMentions, Extension:BlueSpiceAvatars, Extension:BlueSpiceWhoIsOnline - A logged in user can execute malicious JavaScript on other users clients and therefore e.g. hijack sessions&lt;br /&gt;
* Extension:CognitiveProcessDesigner - A user with edit permissions can execute malicious JavaScript on other users clients and therefore e.g. hijack sessions&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
Update to BlueSpice 5.1.2&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
Reported by [https://github.com/SomeMWDev/ SomeRandomDeveloper]&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Security:Hall_of_Fame&amp;diff=12900</id>
		<title>Security:Hall of Fame</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Security:Hall_of_Fame&amp;diff=12900"/>
		<updated>2025-09-18T12:38:37Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;width:100%;&amp;quot;&lt;br /&gt;
! style=&amp;quot;width:200px;&amp;quot; |Date&lt;br /&gt;
! style=&amp;quot;width:200px;&amp;quot; |Name&lt;br /&gt;
!Issue&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:200px;&amp;quot; |2025-09-07&lt;br /&gt;
| style=&amp;quot;width:200px;&amp;quot; |[https://github.com/SomeMWDev/ SomeRandomDeveloper]&lt;br /&gt;
|See [[Security:Security Advisories/BSSA-2025-05|BSSA-2025-05]]&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-05&amp;diff=12898</id>
		<title>Security:Security Advisories/BSSA-2025-05</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-05&amp;diff=12898"/>
		<updated>2025-09-18T07:49:00Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2025-09-??&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|TBD&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
| Current LTS version 5.1, &amp;lt; 5.1.2&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|5.1.2&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|TBD&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Problem ==&lt;br /&gt;
&lt;br /&gt;
* XSS in Extension:AtMentions&lt;br /&gt;
* XSS in Extension:BlueSpiceAvatars&lt;br /&gt;
* XSS in Extension:BlueSpiceWhoIsOnline&lt;br /&gt;
* XSS in Extension:CognitiveProcessDesigner&lt;br /&gt;
&lt;br /&gt;
== Impact assessment ==&lt;br /&gt;
&lt;br /&gt;
* Extension:AtMentions, Extension:BlueSpiceAvatars, Extension:BlueSpiceWhoIsOnline - A logged in user can execute malicious JavaScript on other users clients and therefore e.g. hijack sessions&lt;br /&gt;
* Extension:CognitiveProcessDesigner - A user with edit permissions can execute malicious JavaScript on other users clients and therefore e.g. hijack sessions&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
Update to BlueSpice 5.1.2&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
Reported by [https://github.com/SomeMWDev/ SomeRandomDeveloper]&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-04&amp;diff=12897</id>
		<title>Security:Security Advisories/BSSA-2025-04</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-04&amp;diff=12897"/>
		<updated>2025-09-18T07:47:07Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2025-09-18&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|reported &amp;quot;critical&amp;quot;, BlueSpice assessment: &#039;&#039;&#039;low&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
| Services in current LTS version 5.1&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|fix not yet available&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
| [https://nvd.nist.gov/vuln/detail/CVE-2025-54988 CVE-2025-54988], [https://avd.aquasec.com/nvd/2025/cve-2025-7783 CVE-2025-7783], [https://avd.aquasec.com/nvd/cve-2025-58050 CVE-2025-58050], [https://avd.aquasec.com/nvd/cve-2025-49796 CVE-2025-49796]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Problem==&lt;br /&gt;
&lt;br /&gt;
* Service &amp;lt;code&amp;gt;bluespice/search&amp;lt;/code&amp;gt;- [https://nvd.nist.gov/vuln/detail/CVE-2025-54988 CVE-2025-54988]&lt;br /&gt;
* Service &amp;lt;code&amp;gt;bluespice/formula&amp;lt;/code&amp;gt; - [https://avd.aquasec.com/nvd/2025/cve-2025-7783/ CVE-2025-7783/]&lt;br /&gt;
* Service &amp;lt;code&amp;gt;bluespice/wiki&amp;lt;/code&amp;gt;&lt;br /&gt;
** PCRE: [https://avd.aquasec.com/nvd/cve-2025-58050 CVE-2025-58050]&lt;br /&gt;
** libxml: [https://avd.aquasec.com/nvd/cve-2025-49794 CVE-2025-49794] and [https://avd.aquasec.com/nvd/cve-2025-49796 CVE-2025-49796]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Impact assessment==&lt;br /&gt;
&lt;br /&gt;
* Service &amp;lt;code&amp;gt;bluespice/search&amp;lt;/code&amp;gt;&lt;br /&gt;
** The issues has already been fixed in the upstream repository, but there was no official release yet&lt;br /&gt;
** A manipulated PDF file needs to be uploaded to the wiki, which usually requires an authenticated user context. The service runs only in the background and can not be accessed from outside the virtual network. It has limited access to the host system.&lt;br /&gt;
* Service &amp;lt;code&amp;gt;bluespice/formula&amp;lt;/code&amp;gt;&lt;br /&gt;
** Caused by a dependency of [https://www.npmjs.com/package/coveralls coveralls]&lt;br /&gt;
** Not used production code&lt;br /&gt;
* Service &amp;lt;code&amp;gt;bluespice/wiki&amp;lt;/code&amp;gt;&lt;br /&gt;
** No direct usage of those libraries&lt;br /&gt;
** Only accessed via PHP&lt;br /&gt;
** Main impacts are potential information disclose and denial-of-service&lt;br /&gt;
*** No critical information can be disclosed&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
To mitigate &amp;lt;code&amp;gt;CVE-2025-54988&amp;lt;/code&amp;gt; one can make sure the service has no access to the internet.&lt;br /&gt;
&lt;br /&gt;
Besides this, there is currently no solution to those issues. Once the upstream vendors release fixed packages, the next patchlevel release of BlueSpice will contain them.&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-04&amp;diff=12896</id>
		<title>Security:Security Advisories/BSSA-2025-04</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-04&amp;diff=12896"/>
		<updated>2025-09-18T07:33:17Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2025-09-18&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|reported &amp;quot;critical&amp;quot;, BlueSpice assessment: &#039;&#039;&#039;low&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
| Current LTS version 5.1, &amp;lt; 5.1.2&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|fix not yet available&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
| [https://nvd.nist.gov/vuln/detail/CVE-2025-54988 CVE-2025-54988], [https://avd.aquasec.com/nvd/2025/cve-2025-7783 CVE-2025-7783], [https://avd.aquasec.com/nvd/cve-2025-58050 CVE-2025-58050], [https://avd.aquasec.com/nvd/cve-2025-49796 CVE-2025-49796]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Problem==&lt;br /&gt;
&lt;br /&gt;
* Service &amp;lt;code&amp;gt;bluespice/search&amp;lt;/code&amp;gt;- [https://nvd.nist.gov/vuln/detail/CVE-2025-54988 CVE-2025-54988]&lt;br /&gt;
* Service &amp;lt;code&amp;gt;bluespice/formula&amp;lt;/code&amp;gt; - [https://avd.aquasec.com/nvd/2025/cve-2025-7783/ CVE-2025-7783/]&lt;br /&gt;
* Service &amp;lt;code&amp;gt;bluespice/wiki&amp;lt;/code&amp;gt;&lt;br /&gt;
** PCRE: [https://avd.aquasec.com/nvd/cve-2025-58050 CVE-2025-58050]&lt;br /&gt;
** libxml: [https://avd.aquasec.com/nvd/cve-2025-49794 CVE-2025-49794] and [https://avd.aquasec.com/nvd/cve-2025-49796 CVE-2025-49796]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Impact assessment==&lt;br /&gt;
&lt;br /&gt;
* Service &amp;lt;code&amp;gt;bluespice/search&amp;lt;/code&amp;gt;&lt;br /&gt;
** The issues has already been fixed in the upstream repository, but there was no official release yet&lt;br /&gt;
** A manipulated PDF file needs to be uploaded to the wiki, which usually requires an authenticated user context. The service runs only in the background and can not be accessed from outside the virtual network. It has limited access to the host system.&lt;br /&gt;
* Service &amp;lt;code&amp;gt;bluespice/formula&amp;lt;/code&amp;gt;&lt;br /&gt;
** Caused by a dependency of [https://www.npmjs.com/package/coveralls coveralls]&lt;br /&gt;
** Not used production code&lt;br /&gt;
* Service &amp;lt;code&amp;gt;bluespice/wiki&amp;lt;/code&amp;gt;&lt;br /&gt;
** No direct usage of those libraries&lt;br /&gt;
** Only accessed via PHP&lt;br /&gt;
** Main impacts are potential information disclose and denial-of-service&lt;br /&gt;
*** No critical information can be disclosed&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
To mitigate &amp;lt;code&amp;gt;CVE-2025-54988&amp;lt;/code&amp;gt; one can make sure the service has no access to the internet.&lt;br /&gt;
&lt;br /&gt;
Besides this, there is currently no solution to those issues. Once the upstream vendors release fixed packages, the next patchlevel release of BlueSpice will contain them.&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-05&amp;diff=12895</id>
		<title>Security:Security Advisories/BSSA-2025-05</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-05&amp;diff=12895"/>
		<updated>2025-09-18T07:33:04Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: Created page with &amp;quot;{| class=&amp;quot;wikitable&amp;quot; |+ ! ! |- |Date |2025-09-?? |- |Severity | |- |Affected | &amp;lt; 5.1.2 |- |Fixed in |5.1.2 |- |CVE | |}  == Problem ==  TBD  == Impact assessment == TBD  == Solution == Update to BlueSpice 5.1.2&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2025-09-??&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
| &amp;lt; 5.1.2&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|5.1.2&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Problem ==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Impact assessment ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
Update to BlueSpice 5.1.2&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories&amp;diff=12894</id>
		<title>Security:Security Advisories</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories&amp;diff=12894"/>
		<updated>2025-09-18T07:31:18Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;width:100%;&amp;quot;&lt;br /&gt;
! style=&amp;quot;&amp;quot; |Release name&lt;br /&gt;
! style=&amp;quot;&amp;quot; |Release date&lt;br /&gt;
! style=&amp;quot;&amp;quot; |Title&lt;br /&gt;
! style=&amp;quot;&amp;quot; |References&lt;br /&gt;
! style=&amp;quot;&amp;quot; |Summary&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2025-04|BSSA-2025-04]]&lt;br /&gt;
|2025-09-18&lt;br /&gt;
|Security vulnerabilities in services &amp;lt;code&amp;gt;bluespice/search&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;bluespice/formular&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;bluespice/wiki&amp;lt;/code&amp;gt; &lt;br /&gt;
|[https://nvd.nist.gov/vuln/detail/CVE-2025-54988 CVE-2025-54988], [https://avd.aquasec.com/nvd/2025/cve-2025-7783 CVE-2025-7783], [https://avd.aquasec.com/nvd/cve-2025-58050 CVE-2025-58050], [https://avd.aquasec.com/nvd/cve-2025-49796 CVE-2025-49796]&lt;br /&gt;
|Denial-of-Service, Information Disclosure&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2025-03|BSSA-2025-03]]&lt;br /&gt;
|2025-07-28&lt;br /&gt;
|Security vulnerabilities in Extension:Scribunto, Extension:TabberNeue, Extension:TwoColConflict and Extension:Quiz&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2025-53501 CVE-2025-53501], [https://www.cve.org/CVERecord?id=CVE-2025-53494 CVE-2025-53494], [https://www.cve.org/CVERecord?id=CVE-2025-53093 CVE-2025-53093], [https://www.cve.org/CVERecord?id=CVE-2025-7057 CVE-2025-7057]&lt;br /&gt;
|Information Disclosure, Cross-Site Scripting (XSS)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2025-02|BSSA-2025-02]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2025-04-17&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Security vulnerabilities in Extension:OAuth&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2025-32068 CVE-2025-32068], [https://www.cve.org/CVERecord?id=CVE-2025-32074 CVE-2025-32074]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Allows unauthorized access to the wiki, Cross-Site Scripting (XSS)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2025-01|BSSA-2025-01]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2025-01-20&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Security vulnerabilities in Extension:DataTransfer &lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2025-23081 CVE-2025-23081]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Allows Cross Site Request Forgery, Cross-Site Scripting (XSS)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2023-01|BSSA-2023-01]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2023-07-25&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Ghostscript vulnerability&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2023-36664 CVE-2023-36664]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Code can be executed on the server via a manipulated PDF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-08|BSSA-2022-08]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-3895 CVE-2022-3895]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through use of interface elements&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-07|BSSA-2022-07]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-3958 CVE-2022-3958]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through personal menu items&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-06|BSSA-2022-06]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-3893 CVE-2022-3893]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through the custom menu&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-05|BSSA-2022-05]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-42001 CVE-2022-42001]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through the book navigation&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-04|BSSA-2022-04]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-41789 CVE-2022-41789], [https://www.cve.org/CVERecord?id=CVE-2022-41814 CVE-2022-41814], [https://www.cve.org/CVERecord?id=CVE-2022-42000 CVE-2022-42000]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through user preferences&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-03|BSSA-2022-03]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-41611 CVE-2022-41611]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through main navigation&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-02|BSSA-2022-02]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-11-15&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector on regular pages&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-2511 CVE-2022-2511]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |Arbitrary HTML injection through the &#039;title&#039; parameter&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[[Security:Security Advisories/BSSA-2022-01|BSSA-2022-01]]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |2022-01-31&lt;br /&gt;
| style=&amp;quot;&amp;quot; |XSS attack vector in Search Center&lt;br /&gt;
| style=&amp;quot;&amp;quot; |[https://www.cve.org/CVERecord?id=CVE-2022-2510 CVE-2022-2510]&lt;br /&gt;
| style=&amp;quot;&amp;quot; |JavaScript in search field is reflected back to the browser.&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-04&amp;diff=12892</id>
		<title>Security:Security Advisories/BSSA-2025-04</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-04&amp;diff=12892"/>
		<updated>2025-09-17T12:23:18Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2025-09-17&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|reported &amp;quot;critical&amp;quot;, BlueSpice assessment: &#039;&#039;&#039;low&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
| Current LTS version 5.1, &amp;lt; 5.1.2&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|fix not yet available&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
| [https://nvd.nist.gov/vuln/detail/CVE-2025-54988 CVE-2025-54988], [https://avd.aquasec.com/nvd/2025/cve-2025-7783 CVE-2025-7783], [https://avd.aquasec.com/nvd/cve-2025-58050 CVE-2025-58050], [https://avd.aquasec.com/nvd/cve-2025-49796 CVE-2025-49796]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Problem==&lt;br /&gt;
&lt;br /&gt;
* Service &amp;lt;code&amp;gt;bluespice/search&amp;lt;/code&amp;gt;- [https://nvd.nist.gov/vuln/detail/CVE-2025-54988 CVE-2025-54988]&lt;br /&gt;
* Service &amp;lt;code&amp;gt;bluespice/formula&amp;lt;/code&amp;gt; - [https://avd.aquasec.com/nvd/2025/cve-2025-7783/ CVE-2025-7783/]&lt;br /&gt;
* Service &amp;lt;code&amp;gt;bluespice/wiki&amp;lt;/code&amp;gt;&lt;br /&gt;
** PCRE: [https://avd.aquasec.com/nvd/cve-2025-58050 CVE-2025-58050]&lt;br /&gt;
** libxml: [https://avd.aquasec.com/nvd/cve-2025-49794 CVE-2025-49794] and [https://avd.aquasec.com/nvd/cve-2025-49796 CVE-2025-49796]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Impact assessment==&lt;br /&gt;
&lt;br /&gt;
* Service &amp;lt;code&amp;gt;bluespice/search&amp;lt;/code&amp;gt;&lt;br /&gt;
** The issues has already been fixed in the upstream repository, but there was no official release yet&lt;br /&gt;
** A manipulated PDF file needs to be uploaded to the wiki, which usually requires an authenticated user context. The service runs only in the background and can not be accessed from outside the virtual network. It has limited access to the host system.&lt;br /&gt;
* Service &amp;lt;code&amp;gt;bluespice/formula&amp;lt;/code&amp;gt;&lt;br /&gt;
** Caused by a dependency of [https://www.npmjs.com/package/coveralls coveralls]&lt;br /&gt;
** Not used production code&lt;br /&gt;
* Service &amp;lt;code&amp;gt;bluespice/wiki&amp;lt;/code&amp;gt;&lt;br /&gt;
** No direct usage of those libraries&lt;br /&gt;
** Only accessed via PHP&lt;br /&gt;
** Main impacts are potential information disclose and denial-of-service&lt;br /&gt;
*** No critical information can be disclosed&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
To mitigate &amp;lt;code&amp;gt;CVE-2025-54988&amp;lt;/code&amp;gt; one can make sure the service has no access to the internet.&lt;br /&gt;
&lt;br /&gt;
Besides this, there is currently no solution to those issues. Once the upstream vendors release fixed packages, the next patchlevel release of BlueSpice will contain them.&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-04&amp;diff=12883</id>
		<title>Security:Security Advisories/BSSA-2025-04</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2025-04&amp;diff=12883"/>
		<updated>2025-09-17T11:31:16Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: Created page with &amp;quot;{| class=&amp;quot;wikitable&amp;quot; |+ ! ! |- |Date |2025-09-17 |- |Severity |reported &amp;quot;critical&amp;quot;, BlueSpice assessment: &amp;#039;&amp;#039;&amp;#039;low&amp;#039;&amp;#039;&amp;#039; |- |Affected | Current LTS version 5.1, &amp;lt; 5.1.2 |- |Fixed in |fix not yet available |- |CVE | [https://nvd.nist.gov/vuln/detail/CVE-2025-54988 CVE-2025-54988], [https://avd.aquasec.com/nvd/2025/cve-2025-7783 CVE-2025-7783], [https://avd.aquasec.com/nvd/cve-2025-58050 CVE-2025-58050], [https://avd.aquasec.com/nvd/cve-2025-49796 CVE-2025-49796] |}  ==Problem=...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2025-09-17&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|reported &amp;quot;critical&amp;quot;, BlueSpice assessment: &#039;&#039;&#039;low&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
| Current LTS version 5.1, &amp;lt; 5.1.2&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|fix not yet available&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
| [https://nvd.nist.gov/vuln/detail/CVE-2025-54988 CVE-2025-54988], [https://avd.aquasec.com/nvd/2025/cve-2025-7783 CVE-2025-7783], [https://avd.aquasec.com/nvd/cve-2025-58050 CVE-2025-58050], [https://avd.aquasec.com/nvd/cve-2025-49796 CVE-2025-49796]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Problem==&lt;br /&gt;
&lt;br /&gt;
* Service &amp;lt;code&amp;gt;bluespice/search&amp;lt;/code&amp;gt;&lt;br /&gt;
** [https://nvd.nist.gov/vuln/detail/CVE-2025-54988 CVE-2025-54988]&lt;br /&gt;
** XXE; Fixed in code, not yet released by vendor&lt;br /&gt;
* Service &amp;lt;code&amp;gt;bluespice/formula&amp;lt;/code&amp;gt;&lt;br /&gt;
** [https://avd.aquasec.com/nvd/2025/cve-2025-7783/ CVE-2025-7783/]&lt;br /&gt;
** Caused by a dependency of [https://www.npmjs.com/package/coveralls coveralls]; Not used by any production code.&lt;br /&gt;
* Service &amp;lt;code&amp;gt;bluespice/wiki&amp;lt;/code&amp;gt;&lt;br /&gt;
** PCRE: [https://avd.aquasec.com/nvd/cve-2025-58050 CVE-2025-58050]&lt;br /&gt;
** libxml: [https://avd.aquasec.com/nvd/cve-2025-49794 CVE-2025-49794] and [https://avd.aquasec.com/nvd/cve-2025-49796 CVE-2025-49796]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Impact assessment==&lt;br /&gt;
&lt;br /&gt;
* Service &amp;lt;code&amp;gt;bluespice/search&amp;lt;/code&amp;gt;&lt;br /&gt;
* Service &amp;lt;code&amp;gt;bluespice/formula&amp;lt;/code&amp;gt;&lt;br /&gt;
* Service &amp;lt;code&amp;gt;bluespice/wiki&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
There is currently no solution to those issues. Once the upstream vendors release fixed packages, the next patchlevel release of BlueSpice will contain them.&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=How_to_debug&amp;diff=12828</id>
		<title>How to debug</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=How_to_debug&amp;diff=12828"/>
		<updated>2025-08-18T08:20:10Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Help others to help you==&lt;br /&gt;
Sometimes things go wrong. In many cases the user is then confronted with cryptic or no error messages at all. This page provides help about getting more information about what exactly went wrong, so it can be fixed quickly. This is especially important when asking for help on locations like [https://community.bluespice.com community.bluespice.com].&lt;br /&gt;
&lt;br /&gt;
Additional information can also be found at [[mediawikiwiki:Manual:How_to_debug|&amp;quot;Manual:How to debug&amp;quot; on MediaWiki.org]].&lt;br /&gt;
&lt;br /&gt;
{{Textbox|boxtype=warning|header=Check for sensitive information|text=Most of the techniques described here will output very detailed information about the error, but also about the system and the context. The output may contain sensitive information like usernames, passwords, pathes, access-keys and many more. Before posting any information retrieved by this kind of debugging on a public location (like [https://community.bluespice.com community.bluespice.com]), make sure to redact all potential sensitive information!|icon=yes}}&lt;br /&gt;
&lt;br /&gt;
== Generic information ==&lt;br /&gt;
In general it is a good idea to provide additional context information about the error. Usually this information is easily to access/gather by the one who reports an error and very valueable to anyone trying to help.&lt;br /&gt;
&lt;br /&gt;
Such information can be&lt;br /&gt;
* Browser used (Firefox, Chrome, Edge, ...), ideally with the version&lt;br /&gt;
* URLs (which page the error occurs on, additional parameters that may play into the error)&lt;br /&gt;
* User permission level or role (admin, reader, editor, reviewer, ...)&lt;br /&gt;
&lt;br /&gt;
Again: Be careful if the shared information contains sensible data and redact it if required.&lt;br /&gt;
&lt;br /&gt;
== Server side debugging ==&lt;br /&gt;
There are various ways to get more information about errors by changing some configuration on the server side.&lt;br /&gt;
&lt;br /&gt;
=== Wiki application ===&lt;br /&gt;
&lt;br /&gt;
==== Enable detailed error reporting ====&lt;br /&gt;
Within you &amp;lt;code&amp;gt;LocalSettings.php&amp;lt;/code&amp;gt; file, please add the following lines:&amp;lt;syntaxhighlight lang=&amp;quot;php&amp;quot;&amp;gt;&lt;br /&gt;
$GLOBALS[&#039;wgDebugDumpSql&#039;]  = true;&lt;br /&gt;
$GLOBALS[&#039;wgShowExceptionDetails&#039;] = true;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;This will turn error messages like &amp;lt;code&amp;gt;internal_api_error_DBQueryError&amp;lt;/code&amp;gt; into a more detailed stack of program calls, including database queries and responses.&lt;br /&gt;
&lt;br /&gt;
==== General debug log ====&lt;br /&gt;
Sometimes it can be useful to see all debugging information the application produces. To enable this general debug log please add the following lines within you &amp;lt;code&amp;gt;LocalSettings.php&amp;lt;/code&amp;gt; file:&amp;lt;syntaxhighlight lang=&amp;quot;php&amp;quot;&amp;gt;&lt;br /&gt;
if ( isset( $_GET[&#039;dodebuglog&#039;] ) ) {&lt;br /&gt;
    $GLOBALS[&#039;wgDebugLogFile&#039;] = &amp;quot;$IP/cache/debug.log&amp;quot;;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;Be aware that this configuration is set conditionally. It will only be used if the URL accessed in the browser contains some query string like  &amp;lt;code&amp;gt;dodebuglog=1&amp;lt;/code&amp;gt;. This is to allow a more isolated debug log file. Otherwise other requests (like calls to the &amp;lt;code&amp;gt;load.php&amp;lt;/code&amp;gt; entrypoint for CSS and JS content) may also add into this file, which makes analysis more difficult.&lt;br /&gt;
&lt;br /&gt;
===== Important log channels =====&lt;br /&gt;
{{Textbox|boxtype=important|header=Channel names must be &#039;&#039;exactly&#039;&#039; like listed here! Watch out for casing and spaces!|text=|icon=yes}}&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!Source (Extension)&lt;br /&gt;
!Channel name(s)&lt;br /&gt;
!Use case&lt;br /&gt;
|-&lt;br /&gt;
|MW CORE&lt;br /&gt;
|&amp;lt;code&amp;gt;http&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;HttpError&amp;lt;/code&amp;gt;&lt;br /&gt;
&amp;lt;code&amp;gt;JobExecutor&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;LocalFile&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;exception&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;DeferredUpdates&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;Parsoid&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;resourceloader&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;runJobs&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;session&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;login&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
...&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|MWSTAKE COMPONENTS&lt;br /&gt;
|&amp;lt;code&amp;gt;ContentProvisioner&amp;lt;/code&amp;gt;&lt;br /&gt;
&amp;lt;code&amp;gt;runjobs-trigger-runner&amp;lt;/code&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Math&lt;br /&gt;
|&amp;lt;code&amp;gt;Math&amp;lt;/code&amp;gt;&lt;br /&gt;
|Math&lt;br /&gt;
|-&lt;br /&gt;
|PluggableAuth&lt;br /&gt;
|&amp;lt;code&amp;gt;PluggableAuth&amp;lt;/code&amp;gt;&lt;br /&gt;
|LDAP, SAML, OpenIDConnect&lt;br /&gt;
|-&lt;br /&gt;
|LDAPProvider&lt;br /&gt;
|&amp;lt;code&amp;gt;LDAP&amp;lt;/code&amp;gt;&lt;br /&gt;
&amp;lt;code&amp;gt;MediaWiki\\Extension\\LDAPProvider\\Client&amp;lt;/code&amp;gt;&lt;br /&gt;
|LDAP&lt;br /&gt;
|-&lt;br /&gt;
|LDAPAuthentication2&lt;br /&gt;
|&amp;lt;code&amp;gt;LDAPAuthentication2&amp;lt;/code&amp;gt;&lt;br /&gt;
|LDAP&lt;br /&gt;
|-&lt;br /&gt;
|LDAPGroups&lt;br /&gt;
|&amp;lt;code&amp;gt;LDAPGroups&amp;lt;/code&amp;gt;&lt;br /&gt;
|LDAP&lt;br /&gt;
|-&lt;br /&gt;
|LDAPUserInfo&lt;br /&gt;
|&amp;lt;code&amp;gt;LDAPUserInfo&amp;lt;/code&amp;gt;&lt;br /&gt;
|LDAP&lt;br /&gt;
|-&lt;br /&gt;
|LDAPSyncAll&lt;br /&gt;
|&amp;lt;code&amp;gt;LDAPSyncAll&amp;lt;/code&amp;gt;&lt;br /&gt;
|LDAP&lt;br /&gt;
|-&lt;br /&gt;
|LDAPAuthorization&lt;br /&gt;
|&amp;lt;code&amp;gt;LDAPAuthorization&amp;lt;/code&amp;gt;&lt;br /&gt;
|LDAP&lt;br /&gt;
|-&lt;br /&gt;
|Auth_remoteuser&lt;br /&gt;
|&amp;lt;code&amp;gt;session&amp;lt;/code&amp;gt;&lt;br /&gt;
|LDAP (SSO/Kerberos)&lt;br /&gt;
|-&lt;br /&gt;
|SimpleSAMLphp&lt;br /&gt;
|&amp;lt;code&amp;gt;SimpleSAMLphp&amp;lt;/code&amp;gt;&lt;br /&gt;
|SAML&lt;br /&gt;
|-&lt;br /&gt;
|OpenIDConnect&lt;br /&gt;
|&amp;lt;code&amp;gt;OpenID Connect&amp;lt;/code&amp;gt;&lt;br /&gt;
|OpenIDConnect&lt;br /&gt;
|-&lt;br /&gt;
|ImportOfficeFiles&lt;br /&gt;
|&amp;lt;code&amp;gt;ImportOfficeFiles&amp;lt;/code&amp;gt;&lt;br /&gt;
&amp;lt;code&amp;gt;ImportOfficeFiles_RemoveOrphanedDirectories&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;ImportOfficeFiles_UI&amp;lt;/code&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Workflows&lt;br /&gt;
|&amp;lt;code&amp;gt;workflows&amp;lt;/code&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|BlueSpiceArticlePreviewCapture&lt;br /&gt;
|&amp;lt;code&amp;gt;ArticlePreviewCapture&amp;lt;/code&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OAuth&lt;br /&gt;
|&amp;lt;code&amp;gt;OAuth&amp;lt;/code&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|BlueSpiceUEModulePDF, BlueSpiceUEModuleBookPDF&lt;br /&gt;
|&amp;lt;code&amp;gt;BS::UEModulePDF&amp;lt;/code&amp;gt;&lt;br /&gt;
|PDF&lt;br /&gt;
|-&lt;br /&gt;
|BlueSpiceExtendedSearch&lt;br /&gt;
|&amp;lt;code&amp;gt;BSExtendedSearch&amp;lt;/code&amp;gt;&lt;br /&gt;
|Search&lt;br /&gt;
|-&lt;br /&gt;
|BlueSpiceWikiFarm&lt;br /&gt;
|&amp;lt;code&amp;gt;SimpleFarmerAPI&amp;lt;/code&amp;gt;&lt;br /&gt;
|Farm operations &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===== Default exception log =====&lt;br /&gt;
By default, the application logs the channels &amp;lt;code&amp;gt;error&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;exception&amp;lt;/code&amp;gt; into the regular PHP error log. In case &amp;lt;code&amp;gt;$wgShowExceptionDetails&amp;lt;/code&amp;gt; is set to &amp;lt;code&amp;gt;false&amp;lt;/code&amp;gt; , an user may just see something like this:&lt;br /&gt;
[[File:How to debug Internal Error No Details.png|border|center|thumb|617x617px]]&lt;br /&gt;
In such cases , administrators can check the PHP error log for the unique &amp;quot;error id&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Example:&amp;lt;syntaxhighlight lang=&amp;quot;text&amp;quot;&amp;gt;&lt;br /&gt;
&amp;gt; grep 48f97a8a07b0d68f245bf15d /var/logs/php_error&lt;br /&gt;
&lt;br /&gt;
PHP message: [2024-10-04T15:02:47.217190+02:00] exception.ERROR: [48f97a8a07b0d68f245bf15d] /wiki/Special:Books   Exception: File not found &lt;br /&gt;
{&lt;br /&gt;
    &amp;quot;exception&amp;quot;: &amp;quot;[object] (Exception(code: 0): File not found at /app/bluespice/w/extensions/BlueSpiceBookshelf/src/Special/Books.php:31)&amp;quot;,&lt;br /&gt;
    &amp;quot;exception_url&amp;quot;: &amp;quot;/wiki/Special:Books&amp;quot;,&lt;br /&gt;
    &amp;quot;reqId&amp;quot;: &amp;quot;48f97a8a07b0d68f245bf15d&amp;quot;,&lt;br /&gt;
    &amp;quot;caught_by&amp;quot;: &amp;quot;entrypoint&amp;quot;&lt;br /&gt;
}&lt;br /&gt;
{&lt;br /&gt;
    &amp;quot;host&amp;quot;: &amp;quot;dc7af0034e3b&amp;quot;,&lt;br /&gt;
    &amp;quot;wiki&amp;quot;: &amp;quot;bluespice&amp;quot;,&lt;br /&gt;
    &amp;quot;mwversion&amp;quot;: &amp;quot;1.39.10&amp;quot;,&lt;br /&gt;
    &amp;quot;reqId&amp;quot;: &amp;quot;48f97a8a07b0d68f245bf15d&amp;quot;&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Clientside output of serverside logs ===&lt;br /&gt;
Can be enabled using [[mediawikiwiki:Manual:$wgDebugToolbar|$wgDebugToolbar]]&lt;br /&gt;
&lt;br /&gt;
Example:&amp;lt;syntaxhighlight lang=&amp;quot;php&amp;quot;&amp;gt;&lt;br /&gt;
$GLOBALS[&#039;wgDebugToolbar&#039;] = isset( $_GET[&#039;dodebugtoolbar&#039;] )&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
With this setting you can append &amp;lt;code&amp;gt;?dodebugtoolbar=1&amp;lt;/code&amp;gt; to the URL in the addressbar of your browser.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
File:How to debug DebugToolbar1.png&lt;br /&gt;
File:How to debug DebugToolbar2.png&lt;br /&gt;
File:How to debug DebugToolbar3.png&lt;br /&gt;
File:How to debug DebugToolbar4.png&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Textbox|boxtype=important|header=Incompatible with &amp;lt;code&amp;gt;$bsgDebugLogGroups&amp;lt;/code&amp;gt;!|text=If you have any debug log channel wired via &amp;lt;code&amp;gt;$bsgDebugLogGroups&amp;lt;/code&amp;gt; the clientside debug toolbar will not show all information. Some panels may be empty.|icon=yes}}&lt;br /&gt;
&lt;br /&gt;
== Client side debugging ==&lt;br /&gt;
Many errors occur only on the client and server side debugging will not help. In such cases the webbrowser can be used to retrieve more information.&lt;br /&gt;
&lt;br /&gt;
=== Browser development tools ===&lt;br /&gt;
Most modern browsers have sophisticated development tools. Usually they can be accessed by pressing the &amp;lt;code&amp;gt;F12&amp;lt;/code&amp;gt; key on the keyboard. &lt;br /&gt;
&lt;br /&gt;
==== JavaScript console ====&lt;br /&gt;
When some interface element (button, dialog, ...) does not behave like it should, it is usually worth checking the browsers JavaScript console.&lt;br /&gt;
&lt;br /&gt;
{{Textbox|boxtype=tip|header=Nothing listed?|text=Sometimes it may be required to re-do the action that lead to the error with &#039;&#039;open console&#039;&#039; rather than opening it later.}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:How_to_debug_JS_console_01.png|center|frame]]&lt;br /&gt;
&lt;br /&gt;
One can click the link on the right side of the line to see the location of where the error has emerged from.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:How_to_debug_JS_console_02.png|center|frame]]&lt;br /&gt;
&lt;br /&gt;
====Network panel====&lt;br /&gt;
Sometimes network communication in the background of the application fails. In such cases, the &amp;quot;Network&amp;quot; panel of the browsers developer tools may reveal more information.&lt;br /&gt;
&lt;br /&gt;
The error is also shown in the &amp;quot;Console&amp;quot; tab.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:How_to_debug_Network_panel_01.png|center|frame]]&lt;br /&gt;
&lt;br /&gt;
When in the &amp;quot;Network&amp;quot; panel, one can select the faulty request from the list to get more information.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:How_to_debug_Network_panel_02.png|center|frame]]&lt;br /&gt;
&lt;br /&gt;
The various tabs &amp;quot;Header&amp;quot;, &amp;quot;Payload&amp;quot;, &amp;quot;Response&amp;quot;, etc. can provide useful information.  When reporting such an issue, you can just &amp;quot;copy&amp;quot; the information using the context menu.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:How_to_debug_Network_panel_03.png|center|frame]]&lt;br /&gt;
&lt;br /&gt;
====Network panel: Record complete communication====&lt;br /&gt;
Sometimes it may be required to record a series of network requests and responses in order to debug. This is especially true for &#039;&#039;&#039;login related&#039;&#039;&#039; issues.{{Textbox&lt;br /&gt;
|boxtype=warning&lt;br /&gt;
|header=Do not share sensitive information in public places&lt;br /&gt;
|text=Make sure to only provide trustworthy parties with this kind of information. Do not post this in public places like https://community.bluespice.com&lt;br /&gt;
Use secure communication channels for transmission.&lt;br /&gt;
|icon=yes&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
# Open a “private widow”&lt;br /&gt;
# Enable “Preserve log” in the “nework” panel of the browsers developer tools (F12)[[File:How to debug Network panel all 01.png|center|thumb|300x300px]]&lt;br /&gt;
# Enable&amp;quot;Allow to generate HAR with sensitive data&amp;quot; in the developer tools settings[[File:How to debug Network panel all 02.png|center|thumb|300x300px]][[File:How to debug Network panel all 03.png|center|thumb|300x300px]]&lt;br /&gt;
# Play through the entire process&lt;br /&gt;
# Save the HAR file for further analysis.[[File:How to debug Network panel all 04.png|center|thumb|300x300px]]&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
	<entry>
		<id>https://en.wiki.bluespice.com/w/index.php?title=How_to_debug&amp;diff=12827</id>
		<title>How to debug</title>
		<link rel="alternate" type="text/html" href="https://en.wiki.bluespice.com/w/index.php?title=How_to_debug&amp;diff=12827"/>
		<updated>2025-08-18T08:18:03Z</updated>

		<summary type="html">&lt;p&gt;Rvogel1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Help others to help you==&lt;br /&gt;
Sometimes things go wrong. In many cases the user is then confronted with cryptic or no error messages at all. This page provides help about getting more information about what exactly went wrong, so it can be fixed quickly. This is especially important when asking for help on locations like [https://community.bluespice.com community.bluespice.com].&lt;br /&gt;
&lt;br /&gt;
Additional information can also be found at [[mediawikiwiki:Manual:How_to_debug|&amp;quot;Manual:How to debug&amp;quot; on MediaWiki.org]].&lt;br /&gt;
&lt;br /&gt;
{{Textbox|boxtype=warning|header=Check for sensitive information|text=Most of the techniques described here will output very detailed information about the error, but also about the system and the context. The output may contain sensitive information like usernames, passwords, pathes, access-keys and many more. Before posting any information retrieved by this kind of debugging on a public location (like [https://community.bluespice.com community.bluespice.com]), make sure to redact all potential sensitive information!|icon=yes}}&lt;br /&gt;
&lt;br /&gt;
== Generic information ==&lt;br /&gt;
In general it is a good idea to provide additional context information about the error. Usually this information is easily to access/gather by the one who reports an error and very valueable to anyone trying to help.&lt;br /&gt;
&lt;br /&gt;
Such information can be&lt;br /&gt;
* Browser used (Firefox, Chrome, Edge, ...), ideally with the version&lt;br /&gt;
* URLs (which page the error occurs on, additional parameters that may play into the error)&lt;br /&gt;
* User permission level or role (admin, reader, editor, reviewer, ...)&lt;br /&gt;
&lt;br /&gt;
Again: Be careful if the shared information contains sensible data and redact it if required.&lt;br /&gt;
&lt;br /&gt;
== Server side debugging ==&lt;br /&gt;
There are various ways to get more information about errors by changing some configuration on the server side.&lt;br /&gt;
&lt;br /&gt;
=== Wiki application ===&lt;br /&gt;
&lt;br /&gt;
==== Enable detailed error reporting ====&lt;br /&gt;
Within you &amp;lt;code&amp;gt;LocalSettings.php&amp;lt;/code&amp;gt; file, please add the following lines:&amp;lt;syntaxhighlight lang=&amp;quot;php&amp;quot;&amp;gt;&lt;br /&gt;
$GLOBALS[&#039;wgDebugDumpSql&#039;]  = true;&lt;br /&gt;
$GLOBALS[&#039;wgShowExceptionDetails&#039;] = true;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;This will turn error messages like &amp;lt;code&amp;gt;internal_api_error_DBQueryError&amp;lt;/code&amp;gt; into a more detailed stack of program calls, including database queries and responses.&lt;br /&gt;
&lt;br /&gt;
==== General debug log ====&lt;br /&gt;
Sometimes it can be useful to see all debugging information the application produces. To enable this general debug log please add the following lines within you &amp;lt;code&amp;gt;LocalSettings.php&amp;lt;/code&amp;gt; file:&amp;lt;syntaxhighlight lang=&amp;quot;php&amp;quot;&amp;gt;&lt;br /&gt;
if ( isset( $_GET[&#039;dodebuglog&#039;] ) ) {&lt;br /&gt;
    $GLOBALS[&#039;wgDebugLogFile&#039;] = &amp;quot;$IP/cache/debug.log&amp;quot;;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;Be aware that this configuration is set conditionally. It will only be used if the URL accessed in the browser contains some query string like  &amp;lt;code&amp;gt;dodebuglog=1&amp;lt;/code&amp;gt;. This is to allow a more isolated debug log file. Otherwise other requests (like calls to the &amp;lt;code&amp;gt;load.php&amp;lt;/code&amp;gt; entrypoint for CSS and JS content) may also add into this file, which makes analysis more difficult.&lt;br /&gt;
&lt;br /&gt;
===== Important log channels =====&lt;br /&gt;
{{Textbox|boxtype=important|header=Channel names must be &#039;&#039;exactly&#039;&#039; like listed here! Watch out for casing and spaces!|text=|icon=yes}}&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!Source (Extension)&lt;br /&gt;
!Channel name(s)&lt;br /&gt;
!Use case&lt;br /&gt;
|-&lt;br /&gt;
|MW CORE&lt;br /&gt;
|&amp;lt;code&amp;gt;http&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;HttpError&amp;lt;/code&amp;gt;&lt;br /&gt;
&amp;lt;code&amp;gt;JobExecutor&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;LocalFile&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;exception&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;DeferredUpdates&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;Parsoid&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;resourceloader&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;runJobs&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;session&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;login&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
...&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|MWSTAKE COMPONENTS&lt;br /&gt;
|&amp;lt;code&amp;gt;ContentProvisioner&amp;lt;/code&amp;gt;&lt;br /&gt;
&amp;lt;code&amp;gt;runjobs-trigger-runner&amp;lt;/code&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Math&lt;br /&gt;
|&amp;lt;code&amp;gt;Math&amp;lt;/code&amp;gt;&lt;br /&gt;
|Math&lt;br /&gt;
|-&lt;br /&gt;
|PluggableAuth&lt;br /&gt;
|&amp;lt;code&amp;gt;PluggableAuth&amp;lt;/code&amp;gt;&lt;br /&gt;
|LDAP, SAML, OpenIDConnect&lt;br /&gt;
|-&lt;br /&gt;
|LDAPProvider&lt;br /&gt;
|&amp;lt;code&amp;gt;LDAP&amp;lt;/code&amp;gt;&lt;br /&gt;
&amp;lt;code&amp;gt;MediaWiki\\Extension\\LDAPProvider\\Client&amp;lt;/code&amp;gt;&lt;br /&gt;
|LDAP&lt;br /&gt;
|-&lt;br /&gt;
|LDAPAuthentication2&lt;br /&gt;
|&amp;lt;code&amp;gt;LDAPAuthentication2&amp;lt;/code&amp;gt;&lt;br /&gt;
|LDAP&lt;br /&gt;
|-&lt;br /&gt;
|LDAPGroups&lt;br /&gt;
|&amp;lt;code&amp;gt;LDAPGroups&amp;lt;/code&amp;gt;&lt;br /&gt;
|LDAP&lt;br /&gt;
|-&lt;br /&gt;
|LDAPUserInfo&lt;br /&gt;
|&amp;lt;code&amp;gt;LDAPUserInfo&amp;lt;/code&amp;gt;&lt;br /&gt;
|LDAP&lt;br /&gt;
|-&lt;br /&gt;
|LDAPSyncAll&lt;br /&gt;
|&amp;lt;code&amp;gt;LDAPSyncAll&amp;lt;/code&amp;gt;&lt;br /&gt;
|LDAP&lt;br /&gt;
|-&lt;br /&gt;
|LDAPAuthorization&lt;br /&gt;
|&amp;lt;code&amp;gt;LDAPAuthorization&amp;lt;/code&amp;gt;&lt;br /&gt;
|LDAP&lt;br /&gt;
|-&lt;br /&gt;
|Auth_remoteuser&lt;br /&gt;
|&amp;lt;code&amp;gt;session&amp;lt;/code&amp;gt;&lt;br /&gt;
|LDAP (SSO/Kerberos)&lt;br /&gt;
|-&lt;br /&gt;
|SimpleSAMLphp&lt;br /&gt;
|&amp;lt;code&amp;gt;SimpleSAMLphp&amp;lt;/code&amp;gt;&lt;br /&gt;
|SAML&lt;br /&gt;
|-&lt;br /&gt;
|OpenIDConnect&lt;br /&gt;
|&amp;lt;code&amp;gt;OpenID Connect&amp;lt;/code&amp;gt;&lt;br /&gt;
|OpenIDConnect&lt;br /&gt;
|-&lt;br /&gt;
|ImportOfficeFiles&lt;br /&gt;
|&amp;lt;code&amp;gt;ImportOfficeFiles&amp;lt;/code&amp;gt;&lt;br /&gt;
&amp;lt;code&amp;gt;ImportOfficeFiles_RemoveOrphanedDirectories&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;ImportOfficeFiles_UI&amp;lt;/code&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Workflows&lt;br /&gt;
|&amp;lt;code&amp;gt;workflows&amp;lt;/code&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|BlueSpiceArticlePreviewCapture&lt;br /&gt;
|&amp;lt;code&amp;gt;ArticlePreviewCapture&amp;lt;/code&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OAuth&lt;br /&gt;
|&amp;lt;code&amp;gt;OAuth&amp;lt;/code&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|BlueSpiceUEModulePDF, BlueSpiceUEModuleBookPDF&lt;br /&gt;
|&amp;lt;code&amp;gt;BS::UEModulePDF&amp;lt;/code&amp;gt;&lt;br /&gt;
|PDF&lt;br /&gt;
|-&lt;br /&gt;
|BlueSpiceExtendedSearch&lt;br /&gt;
|&amp;lt;code&amp;gt;BSExtendedSearch&amp;lt;/code&amp;gt;&lt;br /&gt;
|Search&lt;br /&gt;
|-&lt;br /&gt;
|BlueSpiceWikiFarm&lt;br /&gt;
|&amp;lt;code&amp;gt;SimpleFarmerAPI&amp;lt;/code&amp;gt;&lt;br /&gt;
|Farm operations &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===== Default exception log =====&lt;br /&gt;
By default, the application logs the channels &amp;lt;code&amp;gt;error&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;exception&amp;lt;/code&amp;gt; into the regular PHP error log. In case &amp;lt;code&amp;gt;$wgShowExceptionDetails&amp;lt;/code&amp;gt; is set to &amp;lt;code&amp;gt;false&amp;lt;/code&amp;gt; , an user may just see something like this:&lt;br /&gt;
[[File:How to debug Internal Error No Details.png|border|center|thumb|617x617px]]&lt;br /&gt;
In such cases , administrators can check the PHP error log for the unique &amp;quot;error id&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Example:&amp;lt;syntaxhighlight lang=&amp;quot;text&amp;quot;&amp;gt;&lt;br /&gt;
&amp;gt; grep 48f97a8a07b0d68f245bf15d /var/logs/php_error&lt;br /&gt;
&lt;br /&gt;
PHP message: [2024-10-04T15:02:47.217190+02:00] exception.ERROR: [48f97a8a07b0d68f245bf15d] /wiki/Special:Books   Exception: File not found &lt;br /&gt;
{&lt;br /&gt;
    &amp;quot;exception&amp;quot;: &amp;quot;[object] (Exception(code: 0): File not found at /app/bluespice/w/extensions/BlueSpiceBookshelf/src/Special/Books.php:31)&amp;quot;,&lt;br /&gt;
    &amp;quot;exception_url&amp;quot;: &amp;quot;/wiki/Special:Books&amp;quot;,&lt;br /&gt;
    &amp;quot;reqId&amp;quot;: &amp;quot;48f97a8a07b0d68f245bf15d&amp;quot;,&lt;br /&gt;
    &amp;quot;caught_by&amp;quot;: &amp;quot;entrypoint&amp;quot;&lt;br /&gt;
}&lt;br /&gt;
{&lt;br /&gt;
    &amp;quot;host&amp;quot;: &amp;quot;dc7af0034e3b&amp;quot;,&lt;br /&gt;
    &amp;quot;wiki&amp;quot;: &amp;quot;bluespice&amp;quot;,&lt;br /&gt;
    &amp;quot;mwversion&amp;quot;: &amp;quot;1.39.10&amp;quot;,&lt;br /&gt;
    &amp;quot;reqId&amp;quot;: &amp;quot;48f97a8a07b0d68f245bf15d&amp;quot;&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Clientside output of serverside logs ===&lt;br /&gt;
Can be enabled using [[mediawikiwiki:Manual:$wgDebugToolbar|$wgDebugToolbar]]&lt;br /&gt;
&lt;br /&gt;
Example:&amp;lt;syntaxhighlight lang=&amp;quot;php&amp;quot;&amp;gt;&lt;br /&gt;
$GLOBALS[&#039;wgDebugToolbar&#039;] = isset( $_GET[&#039;dodebugtoolbar&#039;] )&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
With this setting you can append &amp;lt;code&amp;gt;?dodebugtoolbar=1&amp;lt;/code&amp;gt; to the URL in the addressbar of your browser.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
File:How to debug DebugToolbar1.png&lt;br /&gt;
File:How to debug DebugToolbar2.png&lt;br /&gt;
File:How to debug DebugToolbar3.png&lt;br /&gt;
File:How to debug DebugToolbar4.png&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Textbox|boxtype=important|header=Incompatible with &amp;lt;code&amp;gt;$bsgDebugLogGroups&amp;lt;/code&amp;gt;!|text=If you have any debug log channel wired via &amp;lt;code&amp;gt;$bsgDebugLogGroups&amp;lt;/code&amp;gt; the clientside debug toolbar will not show all information. Some panels may be empty.|icon=yes}}&lt;br /&gt;
&lt;br /&gt;
== Client side debugging ==&lt;br /&gt;
Many errors occur only on the client and server side debugging will not help. In such cases the webbrowser can be used to retrieve more information.&lt;br /&gt;
&lt;br /&gt;
=== Browser development tools ===&lt;br /&gt;
Most modern browsers have sophisticated development tools. Usually they can be accessed by pressing the &amp;lt;code&amp;gt;F12&amp;lt;/code&amp;gt; key on the keyboard. &lt;br /&gt;
&lt;br /&gt;
==== JavaScript console ====&lt;br /&gt;
When some interface element (button, dialog, ...) does not behave like it should, it is usually worth checking the browsers JavaScript console.&lt;br /&gt;
&lt;br /&gt;
{{Textbox|boxtype=tip|header=Nothing listed?|text=Sometimes it may be required to re-do the action that lead to the error with &#039;&#039;open console&#039;&#039; rather than opening it later.}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:How_to_debug_JS_console_01.png|center|frame]]&lt;br /&gt;
&lt;br /&gt;
One can click the link on the right side of the line to see the location of where the error has emerged from.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:How_to_debug_JS_console_02.png|center|frame]]&lt;br /&gt;
&lt;br /&gt;
====Network panel====&lt;br /&gt;
Sometimes network communication in the background of the application fails. In such cases, the &amp;quot;Network&amp;quot; panel of the browsers developer tools may reveal more information.&lt;br /&gt;
&lt;br /&gt;
The error is also shown in the &amp;quot;Console&amp;quot; tab.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:How_to_debug_Network_panel_01.png|center|frame]]&lt;br /&gt;
&lt;br /&gt;
When in the &amp;quot;Network&amp;quot; panel, one can select the faulty request from the list to get more information.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:How_to_debug_Network_panel_02.png|center|frame]]&lt;br /&gt;
&lt;br /&gt;
The various tabs &amp;quot;Header&amp;quot;, &amp;quot;Payload&amp;quot;, &amp;quot;Response&amp;quot;, etc. can provide useful information.  When reporting such an issue, you can just &amp;quot;copy&amp;quot; the information using the context menu.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:How_to_debug_Network_panel_03.png|center|frame]]&lt;br /&gt;
&lt;br /&gt;
====Network panel: Record complete communication====&lt;br /&gt;
Sometimes it may be required to{{Textbox&lt;br /&gt;
|boxtype=warning&lt;br /&gt;
|header=Do not share sensitive information in public places&lt;br /&gt;
|text=Make sure to only provide trustworthy parties with this kind of information. Do not post this in public places like https://community.bluespice.com&lt;br /&gt;
Use secure communication channels for transmission.&lt;br /&gt;
|icon=yes&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
# Open a “private widow”&lt;br /&gt;
# Enable “Preserve log” in the “nework” panel of the browsers developer tools (F12)[[File:How to debug Network panel all 01.png|center|thumb|300x300px]]&lt;br /&gt;
# Enable&amp;quot;Allow to generate HAR with sensitive data&amp;quot; in the developer tools settings[[File:How to debug Network panel all 02.png|center|thumb|300x300px]][[File:How to debug Network panel all 03.png|center|thumb|300x300px]]&lt;br /&gt;
# Play through the entire process&lt;br /&gt;
# Save the HAR file for further analysis.[[File:How to debug Network panel all 04.png|center|thumb|300x300px]]&lt;/div&gt;</summary>
		<author><name>Rvogel1</name></author>
	</entry>
</feed>