A cross-site scripting (XSS) vulnerability in Typecho v1.2.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into Name parameter under a comment for an Article.
References
Link | Resource |
---|---|
https://h40vv3n.github.io/2024/09/05/typecho-xss/ | Exploit |
https://h40vv3n.github.io/2024/09/05/typecho-xss/ | Exploit |
Configurations
History
23 Apr 2025, 12:33
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:typecho:typecho:1.2.1:-:*:*:*:*:*:* | |
References | () https://h40vv3n.github.io/2024/09/05/typecho-xss/ - Exploit | |
First Time |
Typecho
Typecho typecho |
08 Apr 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
CWE | CWE-79 | |
References | () https://h40vv3n.github.io/2024/09/05/typecho-xss/ - |
08 Apr 2025, 18:13
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
07 Apr 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-07 20:15
Updated : 2025-04-23 12:33
NVD link : CVE-2024-46494
Mitre link : CVE-2024-46494
CVE.ORG link : CVE-2024-46494
JSON object : View
Products Affected
typecho
- typecho
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')