XSS via .py
file containing script tag interpreted as HTML
A vulnerability exists in the file preview/browsing feature of the application, where files with a .py
extension that contain JavaScript code wrapped in <script>
tags may be interpreted and executed as HTML in certain modes. This leads to a stored XSS vulnerability.
Create a .py
file with arbitrary JavaScript content wrapped in <script>
tags. For example:
<script>alert(document.cookie);</script>
When a victim views the file in browsing mode (e.g., a rendered preview), the JavaScript is executed in the browser context.
An attacker can place such a .py
file in the system via remote channels, such as:
* Convincing a webmaster to download or upload the file;
* Tricking users into accessing a file link via public URLs.
Yes. The user must manually click to switch to the browsing or preview mode to trigger the script. And seems only when using ISO-8859-1
encoding.
(S:U)
- The attack does not cross system or privilege boundaries in general.(S:C)
.| Date | Event | |------|-------| | 2025-06-17 | Vulnerability reported | | 2025-06-17 | Comminuty Manager confirmed | | 2025-06-17 | Fixed |
4.0.0-rc.4
{ "nvd_published_at": "2025-06-19T03:15:25Z", "github_reviewed_at": "2025-06-18T14:41:25Z", "severity": "MODERATE", "cwe_ids": [ "CWE-79" ], "github_reviewed": true }