Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-22341 | Aim vulnerable to Cross-site Scripting |
Github GHSA |
GHSA-gmvv-rj92-9w35 | Aim vulnerable to Cross-site Scripting |
Thu, 11 Sep 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Aimstack
Aimstack aim |
|
| CPEs | cpe:2.3:a:aimstack:aim:3.28.0:*:*:*:*:python:*:* | |
| Vendors & Products |
Aimstack
Aimstack aim |
Wed, 23 Jul 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Aimhubio
Aimhubio aim |
|
| Vendors & Products |
Aimhubio
Aimhubio aim |
Tue, 22 Jul 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-79 | |
| Metrics |
cvssV3_1
|
Tue, 22 Jul 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Cross-site Scripting (XSS) in aimhubio Aim 3.28.0 allows remote attackers to execute arbitrary JavaScript in victims browsers via malicious Python code submitted to the /api/reports endpoint, which is interpreted and executed by Pyodide when the report is viewed. No sanitisation or sandbox restrictions prevent JavaScript execution via pyodide.code.run_js(). | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-07-22T18:18:12.170Z
Reserved: 2025-06-16T00:00:00.000Z
Link: CVE-2025-51464
Updated: 2025-07-22T18:16:50.814Z
Status : Analyzed
Published: 2025-07-22T18:15:36.407
Modified: 2025-09-11T16:24:05.467
Link: CVE-2025-51464
No data.
OpenCVE Enrichment
Updated: 2025-07-23T17:36:02Z
EUVD
Github GHSA