ExpressGateway Cross-Site Scripting Vulnerability in lib/rest/routes/users.js
Moderate severity
GitHub Reviewed
Published
Aug 18, 2025
to the GitHub Advisory Database
•
Updated Sep 23, 2025
Description
Published by the National Vulnerability Database
Aug 17, 2025
Published to the GitHub Advisory Database
Aug 18, 2025
Reviewed
Aug 19, 2025
Last updated
Sep 23, 2025
A cross-site scripting (XSS) issue exists in ExpressGateway up to 1.16.10 in the REST endpoint implemented in lib/rest/routes/users.js. User-controlled input is reflected into the HTTP response without proper sanitization, allowing arbitrary JavaScript execution in the browser of a logged-in user who views the affected page/route. The attack can be triggered over the network with low complexity and requires a low-privileged authenticated context and user interaction (viewing the page). Impact is limited to confidentiality and integrity of the session in the affected UI.
References