Monkeytype is a minimalistic and customizable typing test. In 25.49.0 and earlier, there is improper handling of user input which allows an attacker to execute malicious javascript on anyone viewing a malicious quote submission. quote.text and quote.source are user input, and they're inserted straight into the DOM. If they contain HTML tags, they will be rendered (after some escaping using quotes and textarea tags).
References
| Link | Resource |
|---|---|
| https://github.com/monkeytypegame/monkeytype/commit/d6d062a77132ba7d6ba3b482d46ae329d3b8d695 | Patch |
| https://github.com/monkeytypegame/monkeytype/security/advisories/GHSA-mfjh-9552-8g27 | Exploit Vendor Advisory |
| https://github.com/monkeytypegame/monkeytype/security/advisories/GHSA-mfjh-9552-8g27 | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2025-12-04 23:15
Updated : 2025-12-17 16:12
NVD link : CVE-2025-66563
Mitre link : CVE-2025-66563
CVE.ORG link : CVE-2025-66563
JSON object : View
Products Affected
monkeytype
- monkeytype
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
