Cross-Site Scripting (XSS) vulnerability exists in SourceCodester AI Font Matcher (nid=18425, 2025-10-10) that allows remote attackers to execute arbitrary JavaScript in victims' browsers. The vulnerability occurs in the webfonts API handling mechanism where font family names are not properly sanitized. An attacker can intercept fetch requests to the webfonts endpoint and inject malicious JavaScript payloads through font family names, resulting in session cookie theft, account hijacking, and unauthorized actions performed on behalf of authenticated users. The vulnerability can be exploited by injecting a fetch hook that returns controlled font data containing malicious scripts.
History

Thu, 20 Nov 2025 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Remyandrade
Remyandrade ai Font Matcher
CPEs cpe:2.3:a:remyandrade:ai_font_matcher:2025-10-10:*:*:*:*:*:*:*
Vendors & Products Remyandrade
Remyandrade ai Font Matcher

Tue, 18 Nov 2025 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester ai Font Matcher
Vendors & Products Sourcecodester
Sourcecodester ai Font Matcher

Mon, 17 Nov 2025 17:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-79
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 17 Nov 2025 16:00:00 +0000

Type Values Removed Values Added
Description Cross-Site Scripting (XSS) vulnerability exists in SourceCodester AI Font Matcher (nid=18425, 2025-10-10) that allows remote attackers to execute arbitrary JavaScript in victims' browsers. The vulnerability occurs in the webfonts API handling mechanism where font family names are not properly sanitized. An attacker can intercept fetch requests to the webfonts endpoint and inject malicious JavaScript payloads through font family names, resulting in session cookie theft, account hijacking, and unauthorized actions performed on behalf of authenticated users. The vulnerability can be exploited by injecting a fetch hook that returns controlled font data containing malicious scripts.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-11-17T00:00:00.000Z

Updated: 2025-11-17T16:31:49.233Z

Reserved: 2025-10-27T00:00:00.000Z

Link: CVE-2025-63708

cve-icon Vulnrichment

Updated: 2025-11-17T16:31:13.911Z

cve-icon NVD

Status : Analyzed

Published: 2025-11-17T16:15:50.327

Modified: 2025-11-20T20:27:23.200

Link: CVE-2025-63708

cve-icon Redhat

No data.