librespeed/speedtest is an open source, self-hosted speed test for HTML5. In affected versions missing neutralization of the ISP information in a speedtest result leads to stored Cross-site scripting in the JSON API. The `processedString` field in the `ispinfo` parameter is missing neutralization. It is stored when a user submits a speedtest result to the telemetry API (`results/telemetry.php`) and returned in the JSON API (`results/json.php`). This vulnerability has been introduced in commit 3937b94. This vulnerability affects LibreSpeed speedtest instances running version 5.2.5 or higher which have telemetry enabled and has been addressed in version 5.3.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
History

Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00062}

epss

{'score': 0.00114}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-05-01T06:34:13.364Z

Updated: 2024-08-21T14:47:47.000Z

Reserved: 2024-04-19T14:07:11.231Z

Link: CVE-2024-32890

cve-icon Vulnrichment

Updated: 2024-08-02T02:20:35.643Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-01T07:15:39.900

Modified: 2024-11-21T09:15:56.767

Link: CVE-2024-32890

cve-icon Redhat

No data.