CVE-2025-65442

Source
https://cve.org/CVERecord?id=CVE-2025-65442
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-65442.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-65442
Published
2025-12-29T15:16:01.637Z
Modified
2026-01-03T05:45:21.770846Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

DOM-based Cross-Site Scripting (XSS) vulnerability in 201206030 novel V3.5.0 allows remote attackers to execute arbitrary JavaScript code or disclose sensitive information (e.g., user session cookies) via a crafted "wvstest" parameter in the URL or malicious script injection into window.localStorage. The vulnerability arises from insufficient validation and encoding of user-controllable data in the book comment module: unfiltered user input is stored in the backend database (book_comment table, commentContent field) and returned via API, then rendered directly into the page DOM via Vue 3's v-html directive without sanitization. Even if modern browsers' built-in XSS filters block pop-up alerts, attackers can use concealed payloads to bypass interception and achieve actual harm.

References

Affected packages

Git / github.com/201206030/novel

Affected ranges

Type
GIT
Repo
https://github.com/201206030/novel
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

v3.*
v3.0.0
v3.1.0.RELEASE
v3.2.0.RELEASE
v3.3.0.RELEASE
v3.4.0
v3.4.1
v3.5.0-SNAPSHOT

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-65442.json"