CVE-2024-50346

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-50346
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-50346.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-50346
Aliases
  • GHSA-mrc7-2q3w-48j8
Published
2024-11-04T23:13:13.768Z
Modified
2025-12-01T17:46:08.478308Z
Severity
  • 5.1 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N CVSS Calculator
Summary
WebFeed HTML injection vulnerabilities
Details

WebFeed is a lightweight web feed reader extension for Firefox/Chrome. Multiple HTML injection vulnerabilities in WebFeed can lead to CSRF and UI spoofing attacks. A remote attacker can provide malicious RSS feeds and attract the victim user to visit it using WebFeed. The attacker can then inject malicious HTML into the extension page and fool the victim into sending out HTTP requests to arbitrary sites with the victim's credentials. Users are vulnerable to CSRF attacks when visiting malicious RSS feeds via WebFeed. Unwanted actions could be executed on the user's behalf on arbitrary websites. This issue has been addressed in release version 0.9.2. All users are advised to upgrade. There are no known workarounds for this vulnerability.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-79"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/50xxx/CVE-2024-50346.json"
}
References

Affected packages

Git / github.com/taoso/webfeed

Affected ranges

Type
GIT
Repo
https://github.com/taoso/webfeed
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.1
v0.2
v0.3
v0.4
v0.5
v0.6
v0.7