Cross-Site Scripting
Cross-Site Scripting (XSS) vulnerabilities allow attackers to inject malicious scripts into web pages viewed by other users. This can lead to session hijacking, credential theft, and phishing attacks.
25
MEDIUM
General
Understanding Cross-Site Scripting
Detailed information about this vulnerability type.
How to Identify
- •Review security advisories
- •Perform regular security testing
Prevention Best Practices
- ✓Follow security best practices
- ✓Keep systems updated
Cross-Site Scripting CVEs (25)
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2026-26226 | 5.3 | This vulnerability allows an attacker to inject malicious scripts into web pages by manipulating SVG diagrams created with the affected software. It occurs when user-defined styles and classes are not properly secured, enabling the attacker to execute harmful code if the diagrams are rendered in a web application. | Unknown | Theoretical | 7 days agoFeb 13, 2026 |
| CVE-2025-70095 | 6.5 | This vulnerability allows attackers to run malicious scripts on the OpenSourcePOS platform, potentially stealing sensitive information from users or manipulating transactions. It occurs when an attacker can inject harmful code into the item management or sales invoice sections, which requires them to have access to those functions in the application. | opensourceposopen source point of sale | Theoretical | 7 days agoFeb 13, 2026 |
| CVE-2025-70094 | 6.5 | This vulnerability allows attackers to run malicious scripts on a user's browser by injecting harmful code into the Item Category field when generating barcodes. It requires the attacker to have access to the web interface of OpenSourcePOS, making it important for users to be cautious about input validation and access controls. | opensourceposopen source point of sale | Theoretical | 7 days agoFeb 13, 2026 |
| CVE-2025-70091 | 6.5 | This vulnerability allows attackers to run malicious scripts in a user's browser by injecting harmful code into the Phone Number field in the Customers function of OpenSourcePOS v3.4.1. It requires the attacker to trick a user into visiting a page where this code is executed, potentially leading to data theft or session hijacking. | opensourceposopen source point of sale | Theoretical | 7 days agoFeb 13, 2026 |
| CVE-2026-1578 | 5.1 | This vulnerability allows an attacker to inject malicious scripts into the HP App for Android, potentially compromising user data or hijacking sessions. It mainly affects users who are running outdated versions of the app on their mobile devices, so updating to the latest version is crucial for protection. | Unknown | Exploit Available | 7 days agoFeb 13, 2026 |
| CVE-2025-70845 | 6.1 | This vulnerability allows an attacker to inject malicious scripts into the settings page of the lty628 aidigu application, which could then execute in the browsers of users visiting that page. To exploit this, the attacker needs to have access to the "intro" field on the settings page, where user input is not properly checked for harmful content. | Unknown | Theoretical | 8 days agoFeb 12, 2026 |
| CVE-2024-35224 | 7.6 | This vulnerability allows an attacker to inject malicious JavaScript into the OpenProject application, potentially compromising other users' accounts. To exploit this, the attacker needs permissions to edit work packages and add attachments, and they could use this to target a System Admin for privilege escalation. | openprojectopenproject | Theoretical | over 1 year agoMay 23, 2024 |
| CVE-2024-25709 | 6.1 | An attacker can create a malicious link that, when saved by a user in Esri Portal for ArcGIS, can run harmful JavaScript code in that user's web browser. This can be done by anyone, even without special permissions, as long as they are logged in to the system. | esriportal for arcgis | Theoretical | almost 2 years agoApr 4, 2024 |
| CVE-2024-25705 | 5.4 | This vulnerability allows an attacker with basic access to create a malicious link that, when clicked by a user, can run harmful JavaScript code in their browser. The attacker only needs to be logged in with low-level permissions, making it relatively easy to exploit. | esriportal for arcgis | Exploit Available | almost 2 years agoApr 4, 2024 |
| CVE-2023-47240 | 6.5 | This vulnerability allows an attacker with contributor-level access to inject malicious scripts into the CBX Map plugin, which can then execute in the browsers of users who view the affected maps. This means that if an attacker can get contributor access, they can potentially steal sensitive information or perform actions on behalf of other users. | codeboxrcbx map | Exploit Available | over 2 years agoNov 16, 2023 |
| CVE-2023-4451 | 6.1 | This vulnerability allows an attacker to inject malicious scripts into a web page viewed by users of the cockpit application, potentially stealing sensitive information or performing actions on behalf of the user. It requires the attacker to trick a user into clicking a specially crafted link while using a vulnerable version of the software. | agentejocockpit | Exploit Available | over 2 years agoAug 20, 2023 |
| CVE-2023-25837 | 8.4 | This vulnerability allows an attacker with high-level access to create a malicious link that, when clicked by a victim, can run harmful JavaScript in their browser. This could let the attacker steal sensitive information, alter trusted content, or disrupt the application's normal operations. | esriportal for arcgis | Exploit Available | over 2 years agoJul 21, 2023 |
| CVE-2023-25835 | 8.4 | This vulnerability allows an attacker with high-level access to create a malicious link that, when clicked by another user, can run harmful JavaScript in their browser. This could let the attacker steal sensitive information, change site content, or disrupt the site’s normal operations, but it requires the attacker to already have elevated privileges within the system. | esriportal for arcgis | Theoretical | over 2 years agoJul 21, 2023 |
| CVE-2023-25023 | 4.8 | This vulnerability allows an attacker with admin access to inject malicious scripts into the Webinar Ignition plugin, which can then execute when other users view the affected content. It requires the attacker to have administrative privileges, making it a risk primarily for organizations with compromised admin accounts. | saleswonderwebinarignition | Theoretical | almost 3 years agoApr 7, 2023 |
| CVE-2023-24769 | 5.4 | This vulnerability allows attackers to run harmful scripts on a user's browser by tricking them into clicking a specially crafted link when adding a new change detection watch. It requires the attacker to manipulate the URL, making it possible for them to target users of the affected software version before an update is applied. | webtechnologieschangedetection | Exploit Available | about 3 years agoFeb 17, 2023 |
| CVE-2023-0676 | 6.1 | This vulnerability allows an attacker to inject malicious scripts into web pages viewed by users of the phpipam application, potentially stealing sensitive information like session cookies. It occurs when users click on specially crafted links, and it affects versions prior to 1.5.1. | phpipamphpipam | Exploit Available | about 3 years agoFeb 4, 2023 |
| CVE-2022-45970 | 5.4 | This vulnerability allows an attacker to inject malicious scripts into the bulletin board feature of Alist, which could then run in the browsers of users visiting that page. To exploit this, the attacker needs to post a specially crafted message that tricks users into executing the harmful code. | alistgoalist | Theoretical | about 3 years agoDec 12, 2022 |
| CVE-2022-4407 | 6.1 | This vulnerability allows an attacker to inject malicious scripts into a web page viewed by users, potentially stealing their sensitive information or performing actions on their behalf. It affects versions of phpMyFAQ before 3.1.9 and requires the attacker to trick users into clicking on a specially crafted link. | phpmyfaqphpmyfaq | Exploit Available | about 3 years agoDec 11, 2022 |
| CVE-2022-3766 | 6.1 | This vulnerability allows an attacker to inject malicious scripts into web pages viewed by users of the phpMyFAQ application, potentially stealing sensitive information like cookies or session tokens. It can be exploited when a user clicks on a specially crafted link, making it important for users to be cautious about the links they follow. | phpmyfaqphpmyfaq | Exploit Available | over 3 years agoOct 31, 2022 |
| CVE-2022-26533 | 6.1 | This vulnerability allows an attacker to inject malicious scripts into the Alist application, which could then run in the browsers of users who visit the affected page. To exploit this, the attacker needs to trick users into accessing a specially crafted URL that includes the harmful code. | alistgoalist | Theoretical | almost 4 years agoMar 12, 2022 |