PT-2025-41256 · Unknown · Novel-Plus
201206030
·
Published
2025-10-08
·
Updated
2025-10-08
·
CVE-2025-60299
CVSS v3.1
5.4
Medium
| Vector | AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N |
Name of the Vulnerable Software and Affected Versions
Novel-Plus version 5.2.0
Description
An authenticated user can inject malicious JavaScript through the
replyContent parameter when replying to a book comment via the /book/addCommentReply endpoint. The malicious payload is stored in the database and executed in other users’ browsers when they view the affected comment thread. This is a Stored Cross-Site Scripting issue.Recommendations
Apply input validation and output encoding to the
replyContent parameter in the /book/addCommentReply endpoint.Exploit
Fix
XSS
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Novel-Plus