CVE-2025-15454

LOW

zhanglun lettura <0.1.22 - XSS

Title source: llm
STIX 2.1

Description

A vulnerability was detected in zhanglun lettura up to 0.1.22. This issue affects some unknown processing of the file src/components/ArticleView/ContentRender.tsx of the component RSS Handler. The manipulation results in cross site scripting. The attack can be executed remotely. This attack is characterized by high complexity. The exploitability is assessed as difficult. The exploit is now public and may be used. The patch is identified as 67213093db9923e828a6e3fd8696a998c85da2d4. It is best practice to apply a patch to resolve this issue.

References (7)

Core 7
Core References
Permissions Required, VDB Entry vdb-entry technical-description
https://vuldb.com/?id.339487
Permissions Required, VDB Entry signature permissions-required
https://vuldb.com/?ctiid.339487
Permissions Required, VDB Entry third-party-advisory
https://vuldb.com/?submit.725038
Various Sources product
https://github.com/zhanglun/lettura/

Scores

CVSS v3 3.1
EPSS 0.0001
EPSS Percentile 3.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-79 CWE-94
Status published
Products (23)
zhanglun/lettura 0.1.0
zhanglun/lettura 0.1.1
zhanglun/lettura 0.1.10
zhanglun/lettura 0.1.11
zhanglun/lettura 0.1.12
zhanglun/lettura 0.1.13
zhanglun/lettura 0.1.14
zhanglun/lettura 0.1.15
zhanglun/lettura 0.1.16
zhanglun/lettura 0.1.17
... and 13 more
Published Jan 05, 2026
Tracked Since Feb 18, 2026