A stored cross-site scripting (XSS) vulnerability in The Language Sloth Web Application v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Description text field.
References
Link | Resource |
---|---|
http://language.com | Not Applicable |
https://packetstorm.news/files/id/206262 | Broken Link |
Configurations
History
14 Oct 2025, 13:15
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:languagesloth:the_language_sloth:1.0:*:*:*:*:*:*:* | |
First Time |
Languagesloth the Language Sloth
Languagesloth |
|
References | () http://language.com - Not Applicable | |
References | () https://packetstorm.news/files/id/206262 - Broken Link |
04 Aug 2025, 15:06
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
01 Aug 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-79 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
01 Aug 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-01 17:15
Updated : 2025-10-14 13:15
NVD link : CVE-2025-45778
Mitre link : CVE-2025-45778
CVE.ORG link : CVE-2025-45778
JSON object : View
Products Affected
languagesloth
- the_language_sloth
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')