Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-9f58-4465-23c7 | Sharp user-provided input can be evaluated in a SharpShowTextField with Vue template syntax |
Wed, 29 Oct 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 29 Oct 2025 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Code16
Code16 sharp |
|
| Vendors & Products |
Code16
Code16 sharp |
Tue, 28 Oct 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Sharp is a content management framework built for Laravel as a package. Prior to 9.11.1, a Cross-Site Scripting (XSS) vulnerability was discovered in code16/sharp when rendering content using the SharpShowTextField component. In affected versions, expressions wrapped in {{ & }} were evaluated by Vue. This allowed attackers to inject arbitrary JavaScript or HTML that executes in the browser when the field is displayed. The issue has been fixed in v9.11.1 . | |
| Title | Sharp user-provided input can be evaluated in a SharpShowTextField with Vue template syntax | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-10-29T17:31:24.267Z
Reserved: 2025-10-22T18:55:48.011Z
Link: CVE-2025-62798
Updated: 2025-10-29T17:31:21.518Z
Status : Deferred
Published: 2025-10-28T21:15:40.913
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-62798
No data.
OpenCVE Enrichment
Updated: 2025-10-29T10:57:41Z
Github GHSA