Cross-site Scripting (XSS) in aimhubio Aim 3.28.0 allows remote attackers to execute arbitrary JavaScript in victims browsers via malicious Python code submitted to the /api/reports endpoint, which is interpreted and executed by Pyodide when the report is viewed. No sanitisation or sandbox restrictions prevent JavaScript execution via pyodide.code.run_js().
{ "github_reviewed": true, "severity": "MODERATE", "github_reviewed_at": "2025-07-22T20:48:43Z", "cwe_ids": [ "CWE-79" ], "nvd_published_at": "2025-07-22T18:15:36Z" }