Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other. Prior to 1.35.3, Lookyloo passed improperly escaped values to cells rendered in datatables using the orthogonal-data feature. It is definitely exploitable from the popup view, but it is most probably also exploitable in many other places. This vulnerability is fixed in 1.35.3.
References
| Link | Resource |
|---|---|
| https://github.com/Lookyloo/lookyloo/commit/63b39311f6b251a671895d97174345faf1b18e6e | Patch |
| https://github.com/Lookyloo/lookyloo/security/advisories/GHSA-r93r-7jfr-99c3 | Patch Vendor Advisory |
Configurations
History
No history.
Information
Published : 2025-12-02 19:15
Updated : 2025-12-05 14:57
NVD link : CVE-2025-66460
Mitre link : CVE-2025-66460
CVE.ORG link : CVE-2025-66460
JSON object : View
Products Affected
lookyloo
- lookyloo
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
