
Cloud Vulnerability DB
A community-led vulnerabilities database
RSSHub, an open source and extensible RSS feed generator, was found to contain a Cross-Site Scripting (XSS) vulnerability (CVE-2023-26491). The vulnerability was discovered when URL parameters containing certain special characters would return an error page that failed to properly handle XSS protections, enabling the execution of arbitrary JavaScript code. This vulnerability affected versions before commit c910c4d28717fb860fbe064736641f379fab2c91 and was disclosed on February 28, 2023 (GitHub Advisory).
The vulnerability exists in the error handling mechanism of RSSHub when processing URL parameters. When invalid parameters containing special characters are provided, the application returns an error page that includes the unvalidated input in the response, allowing for potential XSS payload execution. The vulnerability was rated as moderate severity and could be triggered when users access specifically crafted URLs (GitHub Advisory).
When exploited, this vulnerability allows attackers to execute arbitrary JavaScript code in the context of users' browsers who access the maliciously crafted URLs. This could potentially lead to session hijacking, theft of sensitive information, or other client-side attacks (GitHub Advisory).
The vulnerability was patched in commit c910c4d28717fb860fbe064736641f379fab2c91. Users are advised to upgrade to this version or later. No workarounds are available for this vulnerability (GitHub Advisory, GitHub Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."