CVSS Score: 8.2 Published: 2025-12-30 Full Report: https://cvereports.com/reports/GHSA-6mp4-q625-mxjp
A deep dive into a Reflected Cross-Site Scripting (XSS) vulnerability in the popular YOURLS URL shortener. By exploiting legacy JSONP implementations in the API, attackers can execute arbitrary JavaScript in the context of the administrator's session.
The YOURLS API allows JSONP responses via a callback parameter. Versions prior to 1.10.3 failed to sanitize this parameter, allowing attackers to inject JavaScript payloads directly into the API response. This results in Reflected XSS, potentially compromising admin accounts.
- CWE ID: CWE-79
- Attack Vector: Network (API)
- CVSS v3: 8.2 (High)
- Impact: Session Hijacking, Redirection Manipulation
- Fix Commit: b1c6100
- Exploit Status: PoC Available
- YOURLS < 1.10.3
- YOURLS: < 1.10.3 (Fixed in:
1.10.3)
- Upgrade to YOURLS 1.10.3 or later immediately.
- If upgrading is impossible, disable the API or block the
callbackparameter via WAF/Web Server config. - Ensure
YOURLS_PRIVATEis set to true to reduce the attack surface.
Remediation Steps:
- Backup your
user/config.phpfile. - Download the latest release from the official YOURLS repository.
- Replace the
includes/directory with the new version. - Verify the version number in the admin dashboard.
Generated by CVEReports - Automated Vulnerability Intelligence