CVE-2025-53631

flaskBlog is a blog app built with Flask. In versions 2.8.1 and prior, improper sanitization of postContent when submitting POST requests to /createpost leads to arbitrary JavaScript execution (XSS) on all pages the post is reflected on including /, /post/[ID], /admin/posts, and /user/[ID] of the user that made the post. At time of publication, there are no public patches available.
Configurations

Configuration 1 (hide)

cpe:2.3:a:dogukanurker:flaskblog:*:*:*:*:*:*:*:*

History

21 Aug 2025, 21:29

Type Values Removed Values Added
First Time Dogukanurker
Dogukanurker flaskblog
References () https://github.com/DogukanUrker/flaskBlog/security/advisories/GHSA-cj43-h8qf-7rw7 - () https://github.com/DogukanUrker/flaskBlog/security/advisories/GHSA-cj43-h8qf-7rw7 - Vendor Advisory
Summary
  • (es) flaskBlog es una aplicación de blog desarrollada con Flask. En la versión 2.8.1 y anteriores, la depuración incorrecta de postContent al enviar solicitudes POST a /createpost provoca la ejecución arbitraria de JavaScript (XSS) en todas las páginas donde se refleja la publicación, incluyendo /, /post/[ID], /admin/posts y /user/[ID] del usuario que la creó. Al momento de la publicación, no hay parches públicos disponibles.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
CPE cpe:2.3:a:dogukanurker:flaskblog:*:*:*:*:*:*:*:*

14 Aug 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-14 16:15

Updated : 2025-08-21 21:29


NVD link : CVE-2025-53631

Mitre link : CVE-2025-53631

CVE.ORG link : CVE-2025-53631


JSON object : View

Products Affected

dogukanurker

  • flaskblog
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')