Description
DOM-based Cross-Site Scripting (XSS) vulnerability in 201206030 novel V3.5.0 allows remote attackers to execute arbitrary JavaScript code or disclose sensitive information (e.g., user session cookies) via a crafted "wvstest" parameter in the URL or malicious script injection into window.localStorage. The vulnerability arises from insufficient validation and encoding of user-controllable data in the book comment module: unfiltered user input is stored in the backend database (book_comment table, commentContent field) and returned via API, then rendered directly into the page DOM via Vue 3's v-html directive without sanitization. Even if modern browsers' built-in XSS filters block pop-up alerts, attackers can use concealed payloads to bypass interception and achieve actual harm.
INFO
Published Date :
2025-12-29T00:00:00.000Z
Last Modified :
2025-12-29T16:45:57.333Z
Source :
mitre
AFFECTED PRODUCTS
The following products are affected by CVE-2025-65442 vulnerability.
| Vendors | Products |
|---|---|
| Xxyopen |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-65442.