SparkyFitness v0.15.8.2 is vulnerable to Cross Site Scripting (XSS) via user input and LLM output.
References
| Link | Resource |
|---|---|
| https://github.com/CodeWithCJ/SparkyFitness | Product |
| https://github.com/CodeWithCJ/SparkyFitness/security/advisories/GHSA-j7x6-6678-2xqp#event-521570 | Exploit Vendor Advisory |
Configurations
History
22 Jan 2026, 15:42
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Codewithcj sparkyfitness
Codewithcj |
|
| CPE | cpe:2.3:a:codewithcj:sparkyfitness:*:*:*:*:*:*:*:* | |
| References | () https://github.com/CodeWithCJ/SparkyFitness - Product | |
| References | () https://github.com/CodeWithCJ/SparkyFitness/security/advisories/GHSA-j7x6-6678-2xqp#event-521570 - Exploit, Vendor Advisory |
15 Jan 2026, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-15 21:16
Updated : 2026-01-22 15:42
NVD link : CVE-2025-65368
Mitre link : CVE-2025-65368
CVE.ORG link : CVE-2025-65368
JSON object : View
Products Affected
codewithcj
- sparkyfitness
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
