Home

Description

SnipCommand 0.1.0 contains a cross-site scripting vulnerability that allows attackers to inject malicious payloads into command snippets. Attackers can execute arbitrary code by embedding malicious JavaScript that triggers remote command execution through file or title inputs.

PUBLISHED Reserved 2026-01-14 | Published 2026-01-16 | Updated 2026-01-16 | Assigner VulnCheck




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N
MEDIUM: 6.1CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Problem types

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

0.1.0
affected

Credits

TaurusOmar finder

References

www.vulncheck.com/...command-persistent-cross-site-scripting exploit

www.exploit-db.com/exploits/49829 (ExploitDB-49829) exploit

github.com/gurayyarar/SnipCommand (SnipCommand GitHub Repository) product

imgur.com/a/I2reH1M (Proof of Concept Video) exploit

www.vulncheck.com/...command-persistent-cross-site-scripting (VulnCheck Advisory: SnipCommand 0.1.0 - Persistent Cross-Site Scripting) third-party-advisory

cve.org (CVE-2021-47841)

nvd.nist.gov (CVE-2021-47841)

Download JSON