Логотип exploitDog
bind:CVE-2025-27108
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-27108

Количество 2

Количество 2

nvd логотип

CVE-2025-27108

12 месяцев назад

dom-expressions is a Fine-Grained Runtime for Performant DOM Rendering. In affected versions the use of javascript's `.replace()` opens up to potential Cross-site Scripting (XSS) vulnerabilities with the special replacement patterns beginning with `$`. Particularly, when the attributes of `Meta` tag from solid-meta are user-defined, attackers can utilise the special replacement patterns, either `$'` or `$\`` to achieve XSS. The solid-meta package has this issue since it uses `useAffect` and context providers, which injects the used assets in the html header. "dom-expressions" uses `.replace()` to insert the assets, which is vulnerable to the special replacement patterns listed above. This effectively means that if the attributes of an asset tag contained user-controlled data, it would be vulnerable to XSS. For instance, there might be meta tags for the open graph protocol in a user profile page, but if attackers set the user query to some payload abusing `.replace()`, then they could

CVSS3: 7.3
EPSS: Низкий
github логотип

GHSA-hw62-58pr-7wc5

12 месяцев назад

DOM Expressions has a Cross-Site Scripting (XSS) vulnerability due to improper use of string.replace

CVSS3: 7.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-27108

dom-expressions is a Fine-Grained Runtime for Performant DOM Rendering. In affected versions the use of javascript's `.replace()` opens up to potential Cross-site Scripting (XSS) vulnerabilities with the special replacement patterns beginning with `$`. Particularly, when the attributes of `Meta` tag from solid-meta are user-defined, attackers can utilise the special replacement patterns, either `$'` or `$\`` to achieve XSS. The solid-meta package has this issue since it uses `useAffect` and context providers, which injects the used assets in the html header. "dom-expressions" uses `.replace()` to insert the assets, which is vulnerable to the special replacement patterns listed above. This effectively means that if the attributes of an asset tag contained user-controlled data, it would be vulnerable to XSS. For instance, there might be meta tags for the open graph protocol in a user profile page, but if attackers set the user query to some payload abusing `.replace()`, then they could

CVSS3: 7.3
0%
Низкий
12 месяцев назад
github логотип
GHSA-hw62-58pr-7wc5

DOM Expressions has a Cross-Site Scripting (XSS) vulnerability due to improper use of string.replace

CVSS3: 7.3
0%
Низкий
12 месяцев назад

Уязвимостей на страницу