Description
A vulnerability was detected in zhanglun lettura up to 0.1.22. This issue affects some unknown processing of the file src/components/ArticleView/ContentRender.tsx of the component RSS Handler. The manipulation results in cross site scripting. The attack can be executed remotely. This attack is characterized by high complexity. The exploitability is assessed as difficult. The exploit is now public and may be used. The patch is identified as 67213093db9923e828a6e3fd8696a998c85da2d4. It is best practice to apply a patch to resolve this issue.
Problem types
Product status
0.1.1
0.1.2
0.1.3
0.1.4
0.1.5
0.1.6
0.1.7
0.1.8
0.1.9
0.1.10
0.1.11
0.1.12
0.1.13
0.1.14
0.1.15
0.1.16
0.1.17
0.1.18
0.1.19
0.1.20
0.1.21
0.1.22
Timeline
| 2026-01-04: | Advisory disclosed |
| 2026-01-04: | VulDB entry created |
| 2026-01-04: | VulDB entry last update |
Credits
cranb3rry (VulDB User)
References
vuldb.com/?id.339487 (VDB-339487 | zhanglun lettura RSS ContentRender.tsx cross site scripting)
vuldb.com/?ctiid.339487 (VDB-339487 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.725038 (Submit #725038 | lettura v0.1.22 XSS)
gist.github.com/...laddress/cba7c19a4eafcb326d0e912adf132be3
gist.github.com/...laddress/cba7c19a4eafcb326d0e912adf132be3
github.com/...ommit/67213093db9923e828a6e3fd8696a998c85da2d4
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.