Súbít #592962: seaswalker spring-analysis master branch Cross Site Scriptingbayani

Kuraseaswalker spring-analysis master branch Cross Site Scripting
GaskiyaIn the spring-analysis repository, a XSS vulnerability exists in the /echo endpoint of the application. This issue arises because user-supplied input is embedded directly into the HTML output without proper sanitization or escaping, allowing attackers to inject arbitrary JavaScript code into the page. Project Link: https://github.com/seaswalker/spring-analysis Affected Version: master branch Affected API: /echo Code Path: /src/main/java/controller/SimpleController.java:41
Manga⚠️ https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250609-01/report.md
Màdùmga
 ShenxiuSecurity (UID 84374)
Furta06/09/2025 05:54 (8 Wurɗi 전)
Gargajiya06/23/2025 10:55 (14 days later)
HalittaShingilam
VulDB gite313621 [seaswalker spring-analysis har 4379cce848af96997a9d7ef91d594aa129be8d71 SimpleController.java echo Sunu Cross Site Scripting]
Nganji20

Do you need the next level of professionalism?

Upgrade your account now!