Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w765-jm6w-4hhj

Опубликовано: 10 сент. 2025
Источник: github
Github: Прошло ревью
CVSS3: 7.1

Описание

Webrecorder packages are vulnerable to XSS through 404 error handling logic

A Reflected Cross-Site Scripting (XSS) vulnerability exists in the 404 error handling logic of wabac.js v2.23.10 and below. The parameter requestURL (derived from the original request target) is directly embedded into an inline <script> block without sanitization or escaping.

This allows an attacker to craft a malicious URL that executes arbitrary JavaScript in the victim’s browser.

The scope may be limited by CORS policies, depending on the situation in which wabac.js is used.

Patches

The vulnerability is fixed in wabac.js v2.23.11.

Пакеты

Наименование

@webrecorder/wabac

npm
Затронутые версииВерсия исправления

< 2.23.11

2.23.11

Наименование

replaywebpage

npm
Затронутые версииВерсия исправления

< 2.3.17

2.3.17

Наименование

@webrecorder/archivewebpage

npm
Затронутые версииВерсия исправления

< 0.15.4

0.15.4

EPSS

Процентиль: 20%
0.00064
Низкий

7.1 High

CVSS3

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 7.1
nvd
5 месяцев назад

wabac.js provides a full web archive replay system, or 'wayback machine', using Service Workers. A Reflected Cross-Site Scripting (XSS) vulnerability exists in the 404 error handling logic of wabac.js v2.23.10 and below. The parameter `requestURL` (derived from the original request target) is directly embedded into an inline `<script>` block without sanitization or escaping. This allows an attacker to craft a malicious URL that executes arbitrary JavaScript in the victim’s browser. The scope may be limited by CORS policies, depending on the situation in which wabac.js is used. The vulnerability is fixed in wabac.js v2.23.11.

EPSS

Процентиль: 20%
0.00064
Низкий

7.1 High

CVSS3

Дефекты

CWE-79