CVE-2025-68457 (CNNVD-202512-3804)
中文标题:
Orejime 跨站脚本漏洞
英文标题:
Orejime has executable code in HTML attributes
漏洞描述
中文描述:
Orejime是Boscop开源的一个用户同意管理工具。 Orejime 2.3.2之前版本存在跨站脚本漏洞,该漏洞源于data属性中嵌入javascript代码,可能导致执行恶意代码。
英文描述:
Orejime is a consent manager that focuses on accessibility. On HTML elements handled by Orejime prior to version 2.3.2, one could run malicious code by embedding `javascript:` code within data attributes. When consenting to the related purpose, Orejime would turn data attributes into unprefixed ones (i.e. `data-href` into `href`), thus executing the code. This shouldn't have any impact on most setups, as elements handled by Orejime are generally hardcoded. The problem would only arise if somebody could inject HTML code within pages. The problem has been patched in version 2.3.2. As a workaround, the problem can be fixed outside of Orejime by sanitizing attributes which could contain executable code.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| boscop-fr | orejime | < 2.3.2 | - | - |
cpe:2.3:a:boscop-fr:orejime:<_2.3.2:*:*:*:*:*:*:*
|
| boscop | orejime | * | - | - |
cpe:2.3:a:boscop:orejime:*:*:*:*:*:node.js:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
4.0 (cna)
LOWCVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:U
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2025-68457 |
2025-12-21 02:11:30 | 2026-01-12 02:12:30 |
| NVD | nvd_CVE-2025-68457 |
2025-12-20 03:16:55 | 2026-01-12 02:28:14 |
| CNNVD | cnnvd_CNNVD-202512-3804 |
2026-01-11 06:15:03 | 2026-01-12 02:38:04 |
版本与语言
安全公告
变更历史
查看详细变更
- affected_products_count: 1 -> 2
查看详细变更
- vulnerability_type: 未提取 -> 跨站脚本
- cnnvd_id: 未提取 -> CNNVD-202512-3804
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- data_sources: ['cve'] -> ['cve', 'nvd']