CVE-2023-26491 – rsshub
Package
Manager: npm
Name: rsshub
Vulnerable Version: >=0 <1.0.0-master.c910c4d
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N
EPSS: 0.00312 pctl0.53788
Details
rsshub vulnerable to Cross-site Scripting via unvalidated URL parameters ### Impact When the URL parameters contain certain special characters, it returns an error page that does not properly handle XSS vulnerabilities, allowing for the execution of arbitrary JavaScript code. Users who access the deliberately constructed URL are affected. ### Patches This vulnerability was fixed in version c910c4d28717fb860fbe064736641f379fab2c91. Please upgrade to this or a later version. ### Workarounds No.
Metadata
Created: 2023-03-01T18:02:28Z
Modified: 2023-03-13T19:18:32Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/03/GHSA-32gr-4cq6-5w5q/GHSA-32gr-4cq6-5w5q.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-32gr-4cq6-5w5q
Finding: F008
Auto approve: 1