4.0 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): HIGH
- Privileges required (PR): HIGH
- User interaction (UI): REQUIRED
- Scope (S): CHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): LOW
- Availability impact (A): NONE
by @LeSuisse Activity log
- Created automatic suggestion
-
@LeSuisse
removed
4 packages
- python312Packages.aioaudiobookshelf
- python313Packages.aioaudiobookshelf
- python314Packages.aioaudiobookshelf
- pkgsRocm.audiobookshelf
- @LeSuisse dismissed
Audiobookshelf has Stored XSS in ItemSearchCard.vue via Audiobook Metadata (Search Results on Mobile App)
Audiobookshelf is a self-hosted audiobook and podcast server. A stored cross-site scripting (XSS) vulnerability exists in versions prior to 0.12.0-beta of the Audiobookshelf mobile application that allows arbitrary JavaScript execution through malicious library metadata. Attackers with library modification privileges can execute code in victim users' browsers/WebViews, potentially leading to session hijacking, data exfiltration, and unauthorized access to native device APIs. The issue is fixed in audiobookshelf-app version 0.12.0-beta, corresponding to audiobookshelf version 2.12.0.
References
Affected products
- ==< 2.12.0
- ==< 0.12.0-beta
Matching in nixpkgs
Ignored packages (4)
pkgs.pkgsRocm.audiobookshelf
Self-hosted audiobook and podcast server
pkgs.python312Packages.aioaudiobookshelf
Async python library to interact with Audiobookshelf
pkgs.python313Packages.aioaudiobookshelf
Async python library to interact with Audiobookshelf
pkgs.python314Packages.aioaudiobookshelf
Async python library to interact with Audiobookshelf
Package maintainers
-
@adamcstephens Adam C. Stephens <happy.plan4249@valkor.net>
-
@jvanbruegge Jan van Brügge <supermanitu@gmail.com>