Description
LGSL (Live Game Server List) provides online status lists for online video games. Versions up to and including 6.2.1 contain a reflected cross-site scripting vulnerability in the `Referer` HTTP header. The vulnerability allows attackers to inject arbitrary JavaScript code, which is reflected in the HTML response without proper sanitization. When crafted malicious input is provided in the `Referer` header, it is echoed back into an HTML attribute in the application’s response. Commit 7ecb839df9358d21f64cdbff5b2536af25a77de1 contains a patch for the issue.
References (3)
Core 3
Core References
Vendor Advisory x_refsource_confirm
https://github.com/tltneon/lgsl/security/advisories/GHSA-ggwq-xc72-33r3
Patch x_refsource_misc
https://github.com/tltneon/lgsl/commit/7ecb839df9358d21f64cdbff5b2536af25a77de1
Various Sources x_refsource_misc
https://github.com/tltneon/lgsl/blob/master/lgsl_files/lgsl_list.php#L20-L24
Scores
CVSS v4
5.3
EPSS
0.0018
EPSS Percentile
39.3%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-79
Status
published
Products (2)
tltneon/lgsl
0Packagist
tltneon/lgsl
<= 6.2.1
Published
Dec 30, 2024
Tracked Since
Feb 18, 2026