4.8 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): HIGH
- User interaction (UI): REQUIRED
- Scope (S): CHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): LOW
- Availability impact (A): NONE
by @LeSuisse Activity log
- Created automatic suggestion
-
@LeSuisse
removed
4 packages
- pkgsRocm.audiobookshelf
- python312Packages.aioaudiobookshelf
- python313Packages.aioaudiobookshelf
- python314Packages.aioaudiobookshelf
- @LeSuisse accepted
- @LeSuisse published on GitHub
Audiobookshelf has Stored XSS in Tooltip.vue via Audiobook Metadata
Audiobookshelf is a self-hosted audiobook and podcast server. A stored cross-site scripting (XSS) vulnerability exists in versions prior to 2.32.0 of the Audiobookshelf web application that allows arbitrary JavaScript execution through malicious library metadata. Attackers with library modification privileges can execute code in victim users' browsers, potentially leading to session hijacking and data exfiltration. Version 2.32.0 contains a patch for the issue.
References
Affected products
- ==< 2.32.0
Matching in nixpkgs
Ignored packages (4)
pkgs.pkgsRocm.audiobookshelf
Self-hosted audiobook and podcast server
pkgs.python312Packages.aioaudiobookshelf
Async python library to interact with Audiobookshelf
pkgs.python313Packages.aioaudiobookshelf
Async python library to interact with Audiobookshelf
pkgs.python314Packages.aioaudiobookshelf
Async python library to interact with Audiobookshelf
Package maintainers
-
@adamcstephens Adam C. Stephens <happy.plan4249@valkor.net>
-
@jvanbruegge Jan van Brügge <supermanitu@gmail.com>