{ "schema_version": "1.4.0", "id": "GHSA-32gr-4cq6-5w5q", "modified": "2023-03-13T19:18:32Z", "published": "2023-03-01T18:02:28Z", "aliases": [ "CVE-2023-26491" ], "summary": "rsshub vulnerable to Cross-site Scripting via unvalidated URL parameters", "details": "### Impact\n\nWhen the URL parameters contain certain special characters, it returns an error page that does not properly handle XSS vulnerabilities, allowing for the execution of arbitrary JavaScript code.\n\nUsers who access the deliberately constructed URL are affected.\n\n### Patches\n\nThis vulnerability was fixed in version c910c4d28717fb860fbe064736641f379fab2c91. Please upgrade to this or a later version.\n\n### Workarounds\n\nNo.\n", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "affected": [ { "package": { "ecosystem": "npm", "name": "rsshub" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "1.0.0-master.c910c4d" } ] } ] } ], "references": [ { "type": "WEB", "url": "https://github.com/DIYgod/RSSHub/security/advisories/GHSA-32gr-4cq6-5w5q" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26491" }, { "type": "WEB", "url": "https://github.com/DIYgod/RSSHub/commit/c910c4d28717fb860fbe064736641f379fab2c91" }, { "type": "PACKAGE", "url": "https://github.com/DIYgod/RSSHub" } ], "database_specific": { "cwe_ids": [ "CWE-79" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2023-03-01T18:02:28Z", "nvd_published_at": "2023-03-03T23:15:00Z" } }