-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from the direct output of unsanitized user input in example/success.php. The code checks for the presence of $_GET['error'] and then echoes $_GET['error_description'] without any encoding (line 36). This allows attackers to inject arbitrary JavaScript via the error_description parameter. While there are no named functions involved, the global script execution context contains the vulnerable code path. The confidence is high as the PoC and advisory explicitly identify this code pattern as the root cause.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| cosenary/instagram | composer | <= 2.3 |
Ongoing coverage of React2Shell