Cross-site Scripting (XSS) in aimhubio Aim 3.28.0 allows remote attackers to execute arbitrary JavaScript in victims browsers via malicious Python code submitted to the /api/reports endpoint, which is interpreted and executed by Pyodide when the report is viewed. No sanitisation or sandbox restrictions prevent JavaScript execution via pyodide.code.run_js().
{
"github_reviewed": true,
"github_reviewed_at": "2025-07-22T20:48:43Z",
"severity": "MODERATE",
"nvd_published_at": "2025-07-22T18:15:36Z",
"cwe_ids": [
"CWE-79"
]
}