A stored cross-site scripting (XSS) vulnerability in Htmly v2.9.5 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Link Name parameter of Menu Editor module.
References
Link | Resource |
---|---|
https://github.com/CrownZTX/vulnerabilities/blob/main/htmly/stored_xss_in_Menueditor.md | Exploit Third Party Advisory |
https://github.com/CrownZTX/vulnerabilities/blob/main/htmly/stored_xss_in_Menueditor.md | Exploit Third Party Advisory |
Configurations
History
21 Aug 2025, 00:46
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:htmly:htmly:2.9.5:*:*:*:*:*:*:* | |
First Time |
Htmly htmly
Htmly |
|
References | () https://github.com/CrownZTX/vulnerabilities/blob/main/htmly/stored_xss_in_Menueditor.md - Exploit, Third Party Advisory |
Information
Published : 2024-04-17 19:15
Updated : 2025-08-21 00:46
NVD link : CVE-2024-30953
Mitre link : CVE-2024-30953
CVE.ORG link : CVE-2024-30953
JSON object : View
Products Affected
htmly
- htmly
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')