Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5m87-3r8p-jp6j

Опубликовано: 12 дек. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 4.6
CVSS3: 4.4

Описание

The CISA Software Acquisition Guide Supplier Response Web Tool before 2025-12-11 was vulnerable to cross-site scripting via text fields. If an attacker could convince a user to import a specially-crafted JSON file, the Tool would load JavaScript from the file into the page. The JavaScript would execute in the context of the user's browser when the user submits the page (clicks 'Next').

The CISA Software Acquisition Guide Supplier Response Web Tool before 2025-12-11 was vulnerable to cross-site scripting via text fields. If an attacker could convince a user to import a specially-crafted JSON file, the Tool would load JavaScript from the file into the page. The JavaScript would execute in the context of the user's browser when the user submits the page (clicks 'Next').

EPSS

Процентиль: 8%
0.0003
Низкий

4.6 Medium

CVSS4

4.4 Medium

CVSS3

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 4.4
nvd
около 2 месяцев назад

The CISA Software Acquisition Guide Supplier Response Web Tool before 2025-12-11 was vulnerable to cross-site scripting via text fields. If an attacker could convince a user to import a specially-crafted JSON file, the Tool would load JavaScript from the file into the page. The JavaScript would execute in the context of the user's browser when the user submits the page (clicks 'Next').

EPSS

Процентиль: 8%
0.0003
Низкий

4.6 Medium

CVSS4

4.4 Medium

CVSS3

Дефекты

CWE-79