CVE-2025-15454

Source
https://cve.org/CVERecord?id=CVE-2025-15454
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-15454.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-15454
Published
2026-01-05T03:15:50.477Z
Modified
2026-03-15T22:51:04.297708Z
Severity
  • 1.3 (Low) CVSS_V4 - CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X CVSS Calculator
Summary
[none]
Details

A vulnerability was detected in zhanglun lettura up to 0.1.22. This issue affects some unknown processing of the file src/components/ArticleView/ContentRender.tsx of the component RSS Handler. The manipulation results in cross site scripting. The attack can be executed remotely. This attack is characterized by high complexity. The exploitability is assessed as difficult. The exploit is now public and may be used. The patch is identified as 67213093db9923e828a6e3fd8696a998c85da2d4. It is best practice to apply a patch to resolve this issue.

References

Affected packages

Git / github.com/zhanglun/lettura

Affected ranges

Type
GIT
Repo
https://github.com/zhanglun/lettura
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*
0.1.0-beta
0.1.0-beta-1
0.1.0-beta-2
v0.*
v0.1.1
v0.1.10
v0.1.11
v0.1.12
v0.1.14
v0.1.15
v0.1.2
v0.1.3
v0.1.4
v0.1.5
v0.1.6
v0.1.7
v0.1.8
v0.1.9-1
v0.1.9-2
v0.1.9-3

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-15454.json"