FKIE_CVE-2024-57783
Vulnerability from fkie_nvd - Published: 2025-06-02 14:15 - Updated: 2025-06-02 17:32
Severity ?
Summary
The desktop application in Dot through 0.9.3 allows XSS and resultant command execution because user input and LLM output are appended to the DOM with innerHTML (in render.js), and because the Electron window can access Node.js APIs.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The desktop application in Dot through 0.9.3 allows XSS and resultant command execution because user input and LLM output are appended to the DOM with innerHTML (in render.js), and because the Electron window can access Node.js APIs."
},
{
"lang": "es",
"value": "La aplicaci\u00f3n de escritorio en Dot hasta 0.9.3 permite XSS y la ejecuci\u00f3n de comandos resultantes porque la entrada del usuario y la salida LLM se agregan al DOM con innerHTML (en render.js) y porque la ventana Electron puede acceder a las API de Node.js."
}
],
"id": "CVE-2024-57783",
"lastModified": "2025-06-02T17:32:17.397",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.4,
"impactScore": 6.0,
"source": "cve@mitre.org",
"type": "Secondary"
}
]
},
"published": "2025-06-02T14:15:21.170",
"references": [
{
"source": "cve@mitre.org",
"url": "https://dotapp.uk"
},
{
"source": "cve@mitre.org",
"url": "https://github.com/EDMPL/Vulnerability-Research/tree/main/CVE-2024-57783"
},
{
"source": "cve@mitre.org",
"url": "https://github.com/alexpinel/Dot/issues/28"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "cve@mitre.org",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…