We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability was found in seaswalker spring-analysis up to 4379cce848af96997a9d7ef91d594aa129be8d71. It has been declared as problematic. Affected by this vulnerability is the function echo of the file /src/main/java/controller/SimpleController.java. The manipulation of the argument Name leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available.
In seaswalker spring-analysis bis 4379cce848af96997a9d7ef91d594aa129be8d71 wurde eine problematische Schwachstelle ausgemacht. Das betrifft die Funktion echo der Datei /src/main/java/controller/SimpleController.java. Dank der Manipulation des Arguments Name mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung. Dieses Produkt setzt Rolling Releases ein. Aus diesem Grund sind Details zu betroffenen oder zu aktualisierende Versionen nicht verfügbar.
2025-06-23: | Advisory disclosed |
2025-06-23: | VulDB entry created |
2025-06-23: | VulDB entry last update |
ShenxiuSecurity (VulDB User)
vuldb.com/?id.313621 (VDB-313621 | seaswalker spring-analysis SimpleController.java echo cross site scripting)
vuldb.com/?ctiid.313621 (VDB-313621 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.592962 (Submit #592962 | seaswalker spring-analysis master branch Cross Site Scripting)
github.com/...cve-proofs/blob/main/POC-20250609-01/report.md
github.com/...cve-proofs/blob/main/POC-20250609-01/report.md
Support options