Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 31 Dec 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Xxyopen
Xxyopen novel |
|
| CPEs | cpe:2.3:a:xxyopen:novel:3.5.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Xxyopen
Xxyopen novel |
Mon, 29 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-79 | |
| Metrics |
cvssV3_1
|
Mon, 29 Dec 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | DOM-based Cross-Site Scripting (XSS) vulnerability in 201206030 novel V3.5.0 allows remote attackers to execute arbitrary JavaScript code or disclose sensitive information (e.g., user session cookies) via a crafted "wvstest" parameter in the URL or malicious script injection into window.localStorage. The vulnerability arises from insufficient validation and encoding of user-controllable data in the book comment module: unfiltered user input is stored in the backend database (book_comment table, commentContent field) and returned via API, then rendered directly into the page DOM via Vue 3's v-html directive without sanitization. Even if modern browsers' built-in XSS filters block pop-up alerts, attackers can use concealed payloads to bypass interception and achieve actual harm. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-12-29T16:45:57.333Z
Reserved: 2025-11-18T00:00:00.000Z
Link: CVE-2025-65442
Updated: 2025-12-29T16:45:52.548Z
Status : Analyzed
Published: 2025-12-29T15:16:01.637
Modified: 2025-12-31T20:07:14.283
Link: CVE-2025-65442
No data.
OpenCVE Enrichment
No data.