Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-9f58-4465-23c7 | Sharp user-provided input can be evaluated in a SharpShowTextField with Vue template syntax |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 29 Oct 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 29 Oct 2025 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Code16
Code16 sharp |
|
| Vendors & Products |
Code16
Code16 sharp |
Tue, 28 Oct 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Sharp is a content management framework built for Laravel as a package. Prior to 9.11.1, a Cross-Site Scripting (XSS) vulnerability was discovered in code16/sharp when rendering content using the SharpShowTextField component. In affected versions, expressions wrapped in {{ & }} were evaluated by Vue. This allowed attackers to inject arbitrary JavaScript or HTML that executes in the browser when the field is displayed. The issue has been fixed in v9.11.1 . | |
| Title | Sharp user-provided input can be evaluated in a SharpShowTextField with Vue template syntax | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-10-29T17:31:24.267Z
Reserved: 2025-10-22T18:55:48.011Z
Link: CVE-2025-62798
Updated: 2025-10-29T17:31:21.518Z
Status : Awaiting Analysis
Published: 2025-10-28T21:15:40.913
Modified: 2025-10-30T15:05:32.197
Link: CVE-2025-62798
No data.
OpenCVE Enrichment
Updated: 2025-10-29T10:57:41Z
Github GHSA