There is a stored XSS in Rambox 0.6.9 that can lead to code execution. The XSS is in the name field while adding/editing a service. The problem occurs due to incorrect sanitization of the name field when being processed and stored. This allows a user to craft a payload for Node.js and Electron, such as an exec of OS commands within the onerror attribute of an IMG element.
{
"nvd_published_at": "2019-10-16T12:15:00Z",
"cwe_ids": [
"CWE-78",
"CWE-79"
],
"github_reviewed_at": "2023-07-18T20:31:10Z",
"github_reviewed": true,
"severity": "CRITICAL"
}