In affected versions, vulnerability-lookup handled user-controlled
content in comments and bundles in an unsafe way, which could lead to
stored Cross-Site Scripting (XSS).
On the backend, the related_vulnerabilities field of bundles accepted
arbitrary strings without format validation or proper sanitization. On
the frontend, comment and bundle descriptions were converted from
Markdown to HTML and then injected directly into the DOM using string
templates and innerHTML. This combination allowed an attacker who could
create or edit comments or bundles to store crafted HTML/JavaScript
payloads which would later be rendered and executed in the browser of
any user visiting the affected profile page (user.html).
This issue affects Vulnerability-Lookup: before 2.18.0.
CVSS
No CVSS.
References
| Link | Resource |
|---|---|
| https://vulnerability.circl.lu/vuln/gcve-1-2025-0035 |
Configurations
No configuration.
History
No history.
Information
Published : 2025-12-08 13:15
Updated : 2025-12-08 18:26
NVD link : CVE-2025-42620
Mitre link : CVE-2025-42620
CVE.ORG link : CVE-2025-42620
JSON object : View
Products Affected
No product.
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
