Vulnerability Description
DOM-based Cross-Site Scripting (XSS) vulnerability in 201206030 novel V3.5.0 allows remote attackers to execute arbitrary JavaScript code or disclose sensitive information (e.g., user session cookies) via a crafted "wvstest" parameter in the URL or malicious script injection into window.localStorage. The vulnerability arises from insufficient validation and encoding of user-controllable data in the book comment module: unfiltered user input is stored in the backend database (book_comment table, commentContent field) and returned via API, then rendered directly into the page DOM via Vue 3's v-html directive without sanitization. Even if modern browsers' built-in XSS filters block pop-up alerts, attackers can use concealed payloads to bypass interception and achieve actual harm.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xxyopen | Novel | 3.5.0 |
Related Weaknesses (CWE)
References
- https://github.com/201206030/novelProduct
- https://github.com/201206030/novel-front-webNot Applicable
- https://github.com/zero-day348/DOM-based-Cross-Site-Scripting-XSS-Vulnerability-ExploitThird Party Advisory
FAQ
What is CVE-2025-65442?
CVE-2025-65442 is a vulnerability with a CVSS score of 6.1 (MEDIUM). DOM-based Cross-Site Scripting (XSS) vulnerability in 201206030 novel V3.5.0 allows remote attackers to execute arbitrary JavaScript code or disclose sensitive information (e.g., user session cookies)...
How severe is CVE-2025-65442?
CVE-2025-65442 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-65442?
Check the references section above for vendor advisories and patch information. Affected products include: Xxyopen Novel.