-
CVSS Score
-The vulnerability stems from improper input sanitization in the /update endpoint handler. The SonarSource blog explicitly shows the vulnerable code pattern where the 'name' parameter is taken from request.form and reflected in a response string. This matches the CWE-79 XSS pattern described in the advisory. The combination of direct reflection without HTML escaping and the presence of CSRF vulnerabilities (CVE-2024-39163) creates an exploit chain where malicious scripts could be executed via forged authenticated requests.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| pyspider | pip | <= 0.3.10 |