AList is a file list program that supports multiple storages. AList contains a reflected cross-site scripting vulnerability in helper.go. The endpoint /i/:link_name takes in a user-provided value and reflects it back in the response. The endpoint returns an application/xml response, opening it up to HTML tags via XHTML and thus leading to a XSS vulnerability. This vulnerability is fixed in 3.29.0.

Subscriptions

Vendors Products
Alist Project Subscribe
Alistgo Subscribe

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-2996 AList is a file list program that supports multiple storages. AList contains a reflected cross-site scripting vulnerability in helper.go. The endpoint /i/:link_name takes in a user-provided value and reflects it back in the response. The endpoint returns an application/xml response, opening it up to HTML tags via XHTML and thus leading to a XSS vulnerability. This vulnerability is fixed in 3.29.0.
Github GHSA Github GHSA GHSA-8pph-gfhp-w226 Alist reflected Cross-Site Scripting vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 13 Feb 2026 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Alistgo
Alistgo alist
CPEs cpe:2.3:a:alistgo:alist:*:*:*:*:*:*:*:*
Vendors & Products Alistgo
Alistgo alist

Fri, 15 Nov 2024 16:45:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Mon, 30 Sep 2024 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Alist Project
Alist Project alist
CPEs cpe:2.3:a:alist_project:alist:*:*:*:*:*:*:*:*
Vendors & Products Alist Project
Alist Project alist
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 30 Sep 2024 15:45:00 +0000

Type Values Removed Values Added
Description AList is a file list program that supports multiple storages. AList contains a reflected cross-site scripting vulnerability in helper.go. The endpoint /i/:link_name takes in a user-provided value and reflects it back in the response. The endpoint returns an application/xml response, opening it up to HTML tags via XHTML and thus leading to a XSS vulnerability. This vulnerability is fixed in 3.29.0.
Title Alist Contains a Reflected Cross-Site Scripting Vulnerability
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-09-30T17:24:16.581Z

Reserved: 2024-09-17T17:42:37.029Z

Link: CVE-2024-47067

cve-icon Vulnrichment

Updated: 2024-09-30T17:24:04.879Z

cve-icon NVD

Status : Analyzed

Published: 2024-09-30T16:15:09.267

Modified: 2026-02-13T21:18:02.773

Link: CVE-2024-47067

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses