Cross-site Scripting (XSS) in aimhubio Aim 3.28.0 allows remote attackers to execute arbitrary JavaScript in victims browsers via malicious Python code submitted to the /api/reports endpoint, which is interpreted and executed by Pyodide when the report is viewed. No sanitisation or sandbox restrictions prevent JavaScript execution via pyodide.code.run_js().
References:GSA_kwCzR0hTQS1nbXZ2LXJqOTItOXczNc4ABKa2
Aim vulnerable to Cross-site Scripting
Affected Packages | Affected Versions | Fixed Versions | |
---|---|---|---|
pypi:aim | <= 3.30.0.dev20250611 | No known fixed version | |
Affected Version RangesAll affected versions |