Home

Description

Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other. Prior to 1.35.3, a XSS vulnerability can be triggered when a user submits a list of URLs to capture, one of them contains a HTML element, and the capture fails. Then, the error field is populated with an error message that contains the bad URL they tried to capture, triggering the XSS. This vulnerability is fixed in 1.35.3.

PUBLISHED Reserved 2025-12-01 | Published 2025-12-02 | Updated 2025-12-02 | Assigner GitHub_M




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

< 1.35.3
affected

References

github.com/...okyloo/security/advisories/GHSA-hvmh-j2jx-48wg

github.com/...ommit/1850a34b8cec52438df3b544295b20cfa35f8ad1

github.com/...ommit/8c3ab96de44c1ce15646d734aa06faf884329116

github.com/...ommit/95cdc00fe37fd89790fa89bb3ee3fefa2da38442

cve.org (CVE-2025-66459)

nvd.nist.gov (CVE-2025-66459)

Download JSON