logo

CVE-2025-9095 express-gateway

Package

Manager: npm
Name: express-gateway
Vulnerable Version: >=0 <=1.16.10

Severity

Level: Low

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

EPSS: 0.00031 pctl0.07373

Details

ExpressGateway Cross-Site Scripting Vulnerability in lib/rest/routes/users.js A flaw has been found in ExpressGateway express-gateway up to 1.16.10. This issue affects some unknown processing in the library lib/rest/routes/users.js of the component REST Endpoint. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Metadata

Created: 2025-08-18T00:30:30Z
Modified: 2025-08-19T16:10:18Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/08/GHSA-q4rg-7cjj-5r86/GHSA-q4rg-7cjj-5r86.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-q4rg-7cjj-5r86
Finding: F425
Auto approve: 1