| Kura | seaswalker spring-analysis master branch Cross Site Scripting |
|---|
| Gaskiya | In the spring-analysis repository, a XSS vulnerability exists in the /echo endpoint of the application.
This issue arises because user-supplied input is embedded directly into the HTML output without proper sanitization or escaping, allowing attackers to inject arbitrary JavaScript code into the page.
Project Link: https://github.com/seaswalker/spring-analysis
Affected Version: master branch
Affected API: /echo
Code Path: /src/main/java/controller/SimpleController.java:41 |
|---|
| Manga | ⚠️ https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250609-01/report.md |
|---|
| Màdùmga | ShenxiuSecurity (UID 84374) |
|---|
| Furta | 06/09/2025 05:54 (8 Wurɗi 전) |
|---|
| Gargajiya | 06/23/2025 10:55 (14 days later) |
|---|
| Halitta | Shingilam |
|---|
| VulDB gite | 313621 [seaswalker spring-analysis har 4379cce848af96997a9d7ef91d594aa129be8d71 SimpleController.java echo Sunu Cross Site Scripting] |
|---|
| Nganji | 20 |
|---|