htmly v3.0.8 is vulnerable to Cross Site Scripting (XSS) in the /author/:name endpoint of the affected application. The name parameter is not properly sanitized before being reflected in the HTML response, allowing attackers to inject arbitrary JavaScript payloads.
References
| Link | Resource |
|---|---|
| https://gist.github.com/akinerkisa/28e97fa132b1a98cff5d05a79b437901 | Third Party Advisory |
| https://github.com/danpros/htmly/releases/tag/v3.0.9#:~:text=Security%20fixes%20found%20in%20version%203.0.8 | Release Notes |
| https://pastebin.com/dVityKmU |
Configurations
History
No history.
Information
Published : 2025-10-02 16:15
Updated : 2026-01-20 18:16
NVD link : CVE-2025-56154
Mitre link : CVE-2025-56154
CVE.ORG link : CVE-2025-56154
JSON object : View
Products Affected
htmly
- htmly
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
