A stored cross-site scripting (XSS) vulnerability exists in flatpressblog/flatpress version 1.3. When a user uploads a file with a `.xsig` extension and directly accesses this file, the server responds with a Content-type of application/octet-stream, leading to the file being processed as an HTML file. This allows an attacker to execute arbitrary JavaScript code, which can be used to steal user cookies, perform HTTP requests, and access content of the same origin.
Metrics
Affected Vendors & Products
References
History
Mon, 23 Jun 2025 21:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Flatpress
Flatpress flatpress |
|
CPEs | cpe:2.3:a:flatpress:flatpress:1.3:*:*:*:*:*:*:* | |
Vendors & Products |
Flatpress
Flatpress flatpress |
Thu, 20 Mar 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 20 Mar 2025 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A stored cross-site scripting (XSS) vulnerability exists in flatpressblog/flatpress version 1.3. When a user uploads a file with a `.xsig` extension and directly accesses this file, the server responds with a Content-type of application/octet-stream, leading to the file being processed as an HTML file. This allows an attacker to execute arbitrary JavaScript code, which can be used to steal user cookies, perform HTTP requests, and access content of the same origin. | |
Title | Stored XSS in flatpressblog/flatpress | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: @huntr_ai
Published: 2025-03-20T10:09:54.666Z
Updated: 2025-03-20T18:33:07.166Z
Reserved: 2024-04-21T12:26:57.065Z
Link: CVE-2024-4023

Updated: 2025-03-20T17:49:54.335Z

Status : Analyzed
Published: 2025-03-20T10:15:32.473
Modified: 2025-06-23T20:46:33.523
Link: CVE-2024-4023

No data.