-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| changedetection.io | pip | < 0.40.2 | 0.40.2 |
The vulnerability stems from improper input validation in the URL parameter handling of the watch creation feature. The fix in PR #1359 introduced protocol validation via SAFE_PROTOCOL_REGEX, indicating the original function stored user-supplied URLs without adequate sanitization. The attack vector specifically targets the watch addition process, and the main page rendering of stored URLs - making the watch addition handler the primary vulnerable component. The high confidence comes from direct correlation between the vulnerability description, attack vector, and the implemented regex-based protocol validation fix.
A Semantic Attack on Google Gemini - Read the Latest Research