Cross-Site Scripting
Cross-Site Scripting (XSS) vulnerabilities allow attackers to inject malicious scripts into web pages viewed by other users. This can lead to session hijacking, credential theft, and phishing attacks.
110
MEDIUM
General
Understanding Cross-Site Scripting
Detailed information about this vulnerability type.
How to Identify
- •Review security advisories
- •Perform regular security testing
Prevention Best Practices
- ✓Follow security best practices
- ✓Keep systems updated
Cross-Site Scripting CVEs (110)
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2025-67978 | 7.1 | This vulnerability allows an attacker to inject malicious scripts into web pages viewed by users, which can lead to unauthorized actions or data theft. It affects versions of the FixBD Educare software up to and including 1.6.1, and requires the attacker to trick users into clicking on a specially crafted link. | Unknown | Theoretical | about 2 months agoFeb 20, 2026 |
| CVE-2025-67972 | 7.1 | This vulnerability allows an attacker to inject malicious scripts into web pages, which can then execute in the browsers of users visiting the affected site, potentially stealing sensitive information like cookies or login credentials. It affects versions of the Prague plugin up to 2.2.8, and the attack can occur simply by tricking users into clicking on a specially crafted link. | Unknown | Theoretical | about 2 months agoFeb 20, 2026 |
| CVE-2025-67971 | 7.1 | This vulnerability allows an attacker to inject malicious scripts into web pages viewed by users, potentially stealing sensitive information like login credentials. It affects versions of FluentCart before 1.3.0 and requires the attacker to trick users into clicking on a specially crafted link. | Unknown | Theoretical | about 2 months agoFeb 20, 2026 |
| CVE-2025-67438 | 6.1 | An attacker can execute harmful JavaScript in a victim's browser by uploading a specially crafted SVG file, which can steal sensitive information like session cookies. This requires the attacker to be logged in to the Sync-in Server, making it a threat primarily to authenticated users. | Unknown | Theoretical | about 2 months agoFeb 20, 2026 |
| CVE-2025-60183 | 0.0 | This vulnerability allows an attacker to inject malicious scripts into the Silencesoft RSS Reader, which can then be stored and executed whenever users access the affected content. To exploit this, the attacker needs to have the ability to submit content that gets displayed to other users, making it a risk primarily in environments where untrusted users can post RSS feeds. | Unknown | Theoretical | about 2 months agoFeb 20, 2026 |
| CVE-2025-53237 | 7.1 | This vulnerability allows an attacker to inject malicious scripts into web pages viewed by users, potentially stealing sensitive information like login credentials. It affects versions of the WP Wizard Cloak plugin up to 1.0.1, and the attack can happen simply by tricking users into clicking on a specially crafted link. | Unknown | Exploit Available | about 2 months agoFeb 20, 2026 |
| CVE-2025-53233 | 7.1 | This vulnerability allows an attacker to inject malicious scripts into web pages viewed by users, potentially stealing sensitive information like cookies or login credentials. It affects specific versions of the RylanH Storyform software, and the attacker needs to trick a user into clicking a specially crafted link to exploit it. | Unknown | Exploit Available | about 2 months agoFeb 20, 2026 |
| CVE-2025-53231 | 7.1 | This vulnerability allows an attacker to inject malicious scripts into web pages viewed by users, potentially stealing sensitive information or taking control of their accounts. It affects versions of the Easy Taxonomy Images plugin up to 1.0.1, and requires the attacker to have access to a system where they can input data that gets stored and displayed on the website. | Unknown | Exploit Available | about 2 months agoFeb 20, 2026 |
| CVE-2025-53228 | 7.1 | This vulnerability allows an attacker to inject malicious scripts into web pages viewed by users, potentially stealing sensitive information like cookies or login credentials. It affects versions of the bbpress Simple Advert Units plugin up to 0.41 and requires the attacker to trick users into clicking on a specially crafted link. | Unknown | Exploit Available | about 2 months agoFeb 20, 2026 |
| CVE-2024-56208 | 0.0 | This vulnerability allows an attacker to inject malicious scripts into the NewsMash application, which can then be executed in the browsers of users who view affected pages. It can be exploited if the attacker can submit content that gets stored and displayed without proper checks, affecting versions up to 1.0.71. | Unknown | Theoretical | about 2 months agoFeb 20, 2026 |
| CVE-2024-52387 | 0.0 | This vulnerability allows an attacker to inject malicious scripts into web pages, which can then be stored and executed whenever users visit those pages, potentially stealing sensitive information or hijacking user sessions. It affects specific versions of the Master Addons for Elementor plugin, and the issue arises when user input is not properly sanitized before being displayed on the website. | Unknown | Theoretical | about 2 months agoFeb 20, 2026 |
| CVE-2024-51915 | 6.5 | This vulnerability allows an attacker to inject malicious scripts into web pages that are served to users, potentially stealing sensitive information or performing actions on behalf of those users. It affects specific versions of the LiteSpeed Cache software, and the attacker needs to have the ability to submit content that gets stored and displayed on the website. | Unknown | Exploit Available | about 2 months agoFeb 20, 2026 |
| CVE-2024-50555 | 0.0 | This vulnerability allows an attacker to inject malicious scripts into a website built with Elementor, which can then be executed in the browsers of users visiting the site. For this to happen, the attacker must have access to a way to input data into the website, such as through a comment or form submission. | Unknown | Theoretical | about 2 months agoFeb 20, 2026 |
| CVE-2024-50452 | 6.5 | This vulnerability allows an attacker to inject malicious scripts into web pages viewed by other users, potentially stealing sensitive information or taking control of their accounts. It affects specific versions of the Nexter Blocks plugin, and the issue arises when user input is not properly handled during page generation. | Unknown | Theoretical | about 2 months agoFeb 20, 2026 |
| CVE-2025-8303 | 6.5 | This vulnerability allows an attacker to inject malicious scripts into web pages viewed by users, potentially stealing sensitive information or hijacking user sessions. It affects a specific version of the Real Estate Script and requires the attacker to find a way to input harmful code into the system, which could be done through forms or other input fields. | Unknown | Exploit Available | about 2 months agoFeb 17, 2026 |
| CVE-2026-2101 | 8.7 | An attacker can run malicious scripts in a user's web browser session, potentially stealing sensitive information or hijacking the session. This vulnerability affects specific versions of ENOVIAvpm Web Access and requires the user to click on a specially crafted link sent by the attacker. | Unknown | Exploit Available | about 2 months agoFeb 16, 2026 |
| CVE-2026-26930 | 7.2 | This vulnerability allows an attacker to inject malicious scripts into the SmarterMail application through MAPI requests, which can lead to unauthorized actions or data theft when users interact with their email. To exploit this, the attacker needs to trick users into clicking on a specially crafted link or opening a compromised email. | Unknown | Exploit Available | about 2 months agoFeb 16, 2026 |
| CVE-2025-59905 | 4.8 | This vulnerability allows an attacker to inject harmful scripts that can run in a victim's browser when they visit a specific web page. For this to work, the attacker needs to trick the victim into clicking a link that includes the malicious code in the URL. | Unknown | Theoretical | about 2 months agoFeb 16, 2026 |
| CVE-2025-59904 | 5.1 | This vulnerability allows an attacker to inject malicious scripts that can run automatically whenever users access a specific part of the Kubysoft application. It can be exploited through various input fields, meaning that if an attacker can submit data to the application, they can potentially compromise other users' sessions. | Unknown | Theoretical | about 2 months agoFeb 16, 2026 |
| CVE-2025-59903 | 5.1 | An attacker can upload a malicious SVG image that contains harmful scripts, which are then stored on the server and executed whenever any user views that image. This vulnerability occurs because the system fails to properly clean or check the SVG files before saving them. | Unknown | Theoretical | about 2 months agoFeb 16, 2026 |