Home

Description

flaskBlog is a blog app built with Flask. In 2.8.0 and earlier, when creating a post, there's no validation of the content of the post stored in the variable "postContent". The vulnerability arises when displaying the content of the post using the | safe filter, that tells the engine to not escape the rendered content. This can lead to a stored XSS inside the content of the post. The code that causes the problem is in template/routes.html.

PUBLISHED Reserved 2025-08-14 | Published 2025-08-19 | Updated 2025-08-19 | Assigner GitHub_M




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-807: Reliance on Untrusted Inputs in a Security Decision

Product status

<= 2.8.0
affected

References

github.com/...skBlog/security/advisories/GHSA-gj9v-qhc3-gcfx

cve.org (CVE-2025-55735)

nvd.nist.gov (CVE-2025-55735)

Download JSON