CVE-2025-66460
BaseFortify
Publication date: 2025-12-02
Last updated on: 2025-12-05
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| lookyloo | lookyloo | 1.35.3 |
| lookyloo | lookyloo | to 1.35.3 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Lookyloo, a web interface for capturing website pages and displaying domain call trees, involves improperly escaped values being passed to cells rendered in datatables using the orthogonal-data feature. This flaw is definitely exploitable from the popup view and likely exploitable in other areas as well. It was fixed in version 1.35.3.
How can this vulnerability impact me? :
The vulnerability could allow an attacker to exploit improperly escaped data in the web interface, potentially leading to issues such as cross-site scripting (XSS) or other injection attacks. This could compromise the integrity or security of the application when users interact with the popup view or other affected areas.
What immediate steps should I take to mitigate this vulnerability?
The immediate step to mitigate this vulnerability is to upgrade Lookyloo to version 1.35.3 or later, where the issue has been fixed.