Description
A vulnerability was detected in zhanglun lettura up to 0.1.22. This issue affects some unknown processing of the file src/components/ArticleView/ContentRender.tsx of the component RSS Handler. The manipulation results in cross site scripting. The attack can be executed remotely. This attack is characterized by high complexity. The exploitability is assessed as difficult. The exploit is now public and may be used. The patch is identified as 67213093db9923e828a6e3fd8696a998c85da2d4. It is best practice to apply a patch to resolve this issue.
References (7)
Core 7
Core References
Permissions Required, VDB Entry vdb-entry
technical-description
https://vuldb.com/?id.339487
Permissions Required, VDB Entry signature
permissions-required
https://vuldb.com/?ctiid.339487
Permissions Required, VDB Entry third-party-advisory
https://vuldb.com/?submit.725038
Various Sources related
https://gist.github.com/youremailaddress/cba7c19a4eafcb326d0e912adf132be3
Various Sources exploit
https://gist.github.com/youremailaddress/cba7c19a4eafcb326d0e912adf132be3#proof-of-concept
Various Sources product
https://github.com/zhanglun/lettura/
Scores
CVSS v3
3.1
EPSS
0.0001
EPSS Percentile
3.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-79
CWE-94
Status
published
Products (23)
zhanglun/lettura
0.1.0
zhanglun/lettura
0.1.1
zhanglun/lettura
0.1.10
zhanglun/lettura
0.1.11
zhanglun/lettura
0.1.12
zhanglun/lettura
0.1.13
zhanglun/lettura
0.1.14
zhanglun/lettura
0.1.15
zhanglun/lettura
0.1.16
zhanglun/lettura
0.1.17
... and 13 more
Published
Jan 05, 2026
Tracked Since
Feb 18, 2026