Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-11687

Опубликовано: 26 янв. 2026
Источник: debian

Описание

A flaw was found in the gi-docgen. This vulnerability allows arbitrary JavaScript execution in the context of the page — enabling DOM access, session cookie theft and other client-side attacks — via a crafted URL that supplies a malicious value to the q GET parameter (reflected DOM XSS).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gi-docgenfixed2025.5-1package
gi-docgenno-dsatrixiepackage
gi-docgenno-dsabookwormpackage

Примечания

  • https://gitlab.gnome.org/GNOME/gi-docgen/-/issues/228

  • https://gitlab.gnome.org/GNOME/gi-docgen/-/merge_requests/254

  • Fixed by: https://gitlab.gnome.org/GNOME/gi-docgen/-/commit/c53d2640bfa5823bbdf33683d95c160267c0ec68 (2025.5)

Связанные уязвимости

CVSS3: 6.1
ubuntu
13 дней назад

A flaw was found in the gi-docgen. This vulnerability allows arbitrary JavaScript execution in the context of the page — enabling DOM access, session cookie theft and other client-side attacks — via a crafted URL that supplies a malicious value to the q GET parameter (reflected DOM XSS).

CVSS3: 6.1
nvd
13 дней назад

A flaw was found in the gi-docgen. This vulnerability allows arbitrary JavaScript execution in the context of the page — enabling DOM access, session cookie theft and other client-side attacks — via a crafted URL that supplies a malicious value to the q GET parameter (reflected DOM XSS).

CVSS3: 6.1
github
13 дней назад

GI-DocGen vulnerable to Reflected XSS via unescaped query strings