CVE-2025-66459
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-02

Last updated on: 2025-12-05

Assigner: GitHub, Inc.

Description
Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other. Prior to 1.35.3, a XSS vulnerability can be triggered when a user submits a list of URLs to capture, one of them contains a HTML element, and the capture fails. Then, the error field is populated with an error message that contains the bad URL they tried to capture, triggering the XSS. This vulnerability is fixed in 1.35.3.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-02
Last Modified
2025-12-05
Generated
2026-05-07
AI Q&A
2025-12-02
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
lookyloo lookyloo *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a Cross-Site Scripting (XSS) issue in Lookyloo versions prior to 1.35.3. It occurs when a user submits a list of URLs to capture, and one of the URLs contains an HTML element that causes the capture to fail. The error message then includes the problematic URL, which can trigger the XSS vulnerability by injecting malicious code into the error field.


How can this vulnerability impact me? :

The XSS vulnerability can allow an attacker to execute malicious scripts in the context of the user's browser when they view the error message. This can lead to unauthorized actions, data theft, or session hijacking, depending on how the application and user interact with the malicious script.


What immediate steps should I take to mitigate this vulnerability?

Upgrade Lookyloo to version 1.35.3 or later, as this version contains the fix for the XSS vulnerability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart