CVE-2025-70458
BaseFortify
Publication date: 2026-01-23
Last updated on: 2026-01-30
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| remyandrade | domain_availability_checker | 1.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
To mitigate this DOM-based XSS vulnerability, avoid using the unsafe innerHTML property to render user-supplied data. Instead, use safer methods such as textContent or proper sanitization libraries to handle and display domain search results securely.
Can you explain this vulnerability to me?
This vulnerability is a DOM-based Cross-Site Scripting (XSS) issue in the DomainCheckerApp class within domain/script.js of Sourcecodester Domain Availability Checker v1.0. It happens because the application improperly handles user-supplied data in the createResultElement method by using the unsafe innerHTML property to render domain search results, which can allow attackers to inject malicious scripts.
How can this vulnerability impact me? :
This vulnerability can allow attackers to execute malicious scripts in the context of the affected application, potentially leading to theft of user data, session hijacking, or other malicious actions performed on behalf of the user.