Soumettre #627833: GitHub Web Application Express Gateway 1.16.10 and possibly earlier Cross Site Scriptinginformation

TitreGitHub Web Application Express Gateway 1.16.10 and possibly earlier Cross Site Scripting
DescriptionA reflected cross-site scripting (XSS) vulnerability has been identified in Express Gateway version 1.16.10. The application does not properly sanitize user-supplied input in the /apps/:id and /users/:id routes before reflecting it in HTTP responses. An attacker can craft a malicious URL containing arbitrary JavaScript code, which will be executed in the context of a victim’s browser when the URL is accessed. This issue can lead to session hijacking, unauthorized actions, or data exfiltration when an administrator or other privileged user visits the crafted link.
La source⚠️ https://github.com/freshfish-hust/my-cves/issues/6
Utilisateur
 Haoatao (UID 88608)
Soumission03/08/2025 13:14 (il y a 9 mois)
Modérer17/08/2025 14:54 (14 days later)
StatutAccepté
Entrée VulDB320418 [ExpressGateway express-gateway jusqu’à 1.16.10 REST Endpoint lib/rest/routes/apps.js cross site scripting]
Points20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!