Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2025-27108

Опубликовано: 21 фев. 2025
Источник: nvd
CVSS3: 7.3
CVSS3: 6.1
EPSS Низкий

Описание

dom-expressions is a Fine-Grained Runtime for Performant DOM Rendering. In affected versions the use of javascript's .replace() opens up to potential Cross-site Scripting (XSS) vulnerabilities with the special replacement patterns beginning with $. Particularly, when the attributes of Meta tag from solid-meta are user-defined, attackers can utilise the special replacement patterns, either $' or $\`` to achieve XSS. The solid-meta package has this issue since it uses useAffectand context providers, which injects the used assets in the html header. "dom-expressions" uses.replace()to insert the assets, which is vulnerable to the special replacement patterns listed above. This effectively means that if the attributes of an asset tag contained user-controlled data, it would be vulnerable to XSS. For instance, there might be meta tags for the open graph protocol in a user profile page, but if attackers set the user query to some payload abusing.replace()`, then they could

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:ryansolid:dom_expressions:*:*:*:*:*:*:*:*
Версия до 0.39.5 (исключая)

EPSS

Процентиль: 42%
0.00196
Низкий

7.3 High

CVSS3

6.1 Medium

CVSS3

Дефекты

CWE-79
CWE-79

Связанные уязвимости

CVSS3: 7.3
github
12 месяцев назад

DOM Expressions has a Cross-Site Scripting (XSS) vulnerability due to improper use of string.replace

EPSS

Процентиль: 42%
0.00196
Низкий

7.3 High

CVSS3

6.1 Medium

CVSS3

Дефекты

CWE-79
CWE-79