-
CVSS Score
-The vulnerability stems from using addcslashes() for output escaping in JavaScript contexts. This function only escapes specific characters (like quotes) but doesn't handle HTML special characters. The patched commit replaces all these instances with htmlspecialchars(), which properly encodes for HTML contexts. The affected code paths directly inject user-controlled parameters (eventtype, program, etc.) into JavaScript without adequate sanitization, enabling DOM XSS when malicious input contains unescaped HTML/JS metacharacters.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| librenms/librenms | composer | < 23.9.0 | 23.9.0 |
A Semantic Attack on Google Gemini - Read the Latest Research