Cross-Site Scripting (XSS) vulnerability exists in SourceCodester AI Font Matcher (nid=18425, 2025-10-10) that allows remote attackers to execute arbitrary JavaScript in victims' browsers. The vulnerability occurs in the webfonts API handling mechanism where font family names are not properly sanitized. An attacker can intercept fetch requests to the webfonts endpoint and inject malicious JavaScript payloads through font family names, resulting in session cookie theft, account hijacking, and unauthorized actions performed on behalf of authenticated users. The vulnerability can be exploited by injecting a fetch hook that returns controlled font data containing malicious scripts.
Metrics
Affected Vendors & Products
References
History
Thu, 20 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Remyandrade
Remyandrade ai Font Matcher |
|
| CPEs | cpe:2.3:a:remyandrade:ai_font_matcher:2025-10-10:*:*:*:*:*:*:* | |
| Vendors & Products |
Remyandrade
Remyandrade ai Font Matcher |
Tue, 18 Nov 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sourcecodester
Sourcecodester ai Font Matcher |
|
| Vendors & Products |
Sourcecodester
Sourcecodester ai Font Matcher |
Mon, 17 Nov 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-79 | |
| Metrics |
cvssV3_1
|
Mon, 17 Nov 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Cross-Site Scripting (XSS) vulnerability exists in SourceCodester AI Font Matcher (nid=18425, 2025-10-10) that allows remote attackers to execute arbitrary JavaScript in victims' browsers. The vulnerability occurs in the webfonts API handling mechanism where font family names are not properly sanitized. An attacker can intercept fetch requests to the webfonts endpoint and inject malicious JavaScript payloads through font family names, resulting in session cookie theft, account hijacking, and unauthorized actions performed on behalf of authenticated users. The vulnerability can be exploited by injecting a fetch hook that returns controlled font data containing malicious scripts. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-11-17T00:00:00.000Z
Updated: 2025-11-17T16:31:49.233Z
Reserved: 2025-10-27T00:00:00.000Z
Link: CVE-2025-63708
Updated: 2025-11-17T16:31:13.911Z
Status : Analyzed
Published: 2025-11-17T16:15:50.327
Modified: 2025-11-20T20:27:23.200
Link: CVE-2025-63708
No data.