Novel-Plus with 5.2.0 was discovered to contain a Stored Cross-Site Scripting (XSS) vulnerability via the /book/addCommentReply endpoint. An authenticated user can inject malicious JavaScript through the replyContent parameter when replying to a book comment. The payload is stored in the database and is executed in other users’ browsers when they view the affected comment thread.
References
| Link | Resource |
|---|---|
| https://github.com/201206030/novel-plus | Product |
| https://notes.sjtu.edu.cn/s/OtnFaGbI4 | Exploit Third Party Advisory |
| https://notes.sjtu.edu.cn/s/OtnFaGbI4 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-10-08 13:15
Updated : 2025-10-10 16:18
NVD link : CVE-2025-60299
Mitre link : CVE-2025-60299
CVE.ORG link : CVE-2025-60299
JSON object : View
Products Affected
xxyopen
- novel-plus
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
