Description
An issue was discovered in Nim before 1.6.2. The RST module of the Nim language stdlib, as used in NimForum and other products, permits the javascript: URI scheme and thus can lead to XSS in some applications. (Nim versions 1.6.2 and later are fixed; there may be backports of the fix to some earlier versions. NimForum 2.2.0 is fixed.)
References (5)
Core 5
Core References
Issue Tracking, Vendor Advisory
https://forum.nim-lang.org/t/8852
Patch, Third Party Advisory
https://github.com/nim-lang/Nim/commit/46275126b89218e64844eee169e8ced05dd0e2d7
Third Party Advisory
https://github.com/nim-lang/Nim/compare/v1.6.0...v1.6.2
Patch, Third Party Advisory
https://github.com/nim-lang/Nim/pull/19134
Scores
CVSS v3
6.1
EPSS
0.0067
EPSS Percentile
71.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-79
Status
published
Products (2)
nim-lang/nim
< 1.6.2
nim-lang/nimforum
< 2.2.0
Published
Jan 13, 2023
Tracked Since
Feb 18, 2026