Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 10 Oct 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Xxyopen
Xxyopen novel-plus |
|
| CPEs | cpe:2.3:a:xxyopen:novel-plus:5.2.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Xxyopen
Xxyopen novel-plus |
Thu, 09 Oct 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Novel-plus
Novel-plus novel-plus |
|
| Vendors & Products |
Novel-plus
Novel-plus novel-plus |
Wed, 08 Oct 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-79 | |
| Metrics |
cvssV3_1
|
Wed, 08 Oct 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Novel-Plus with 5.2.0 was discovered to contain a Stored Cross-Site Scripting (XSS) vulnerability via the /book/addCommentReply endpoint. An authenticated user can inject malicious JavaScript through the replyContent parameter when replying to a book comment. The payload is stored in the database and is executed in other users’ browsers when they view the affected comment thread. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-10-08T20:42:15.303Z
Reserved: 2025-09-26T00:00:00.000Z
Link: CVE-2025-60299
Updated: 2025-10-08T20:42:11.523Z
Status : Analyzed
Published: 2025-10-08T13:15:34.790
Modified: 2025-10-10T16:18:08.840
Link: CVE-2025-60299
No data.
OpenCVE Enrichment
Updated: 2025-10-09T12:55:11Z