{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-66563","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2025-12-04T16:05:22.975Z","datePublished":"2025-12-04T22:34:10.010Z","dateUpdated":"2025-12-05T14:59:45.465Z"},"containers":{"cna":{"title":"Monkeytype vulnerable to stored XSS in approve quotes page","problemTypes":[{"descriptions":[{"cweId":"CWE-79","lang":"en","description":"CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","type":"CWE"}]}],"metrics":[{"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"PASSIVE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"LOW","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","baseScore":7.1,"baseSeverity":"HIGH","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N","version":"4.0"}}],"references":[{"name":"https://github.com/monkeytypegame/monkeytype/security/advisories/GHSA-mfjh-9552-8g27","tags":["x_refsource_CONFIRM"],"url":"https://github.com/monkeytypegame/monkeytype/security/advisories/GHSA-mfjh-9552-8g27"},{"name":"https://github.com/monkeytypegame/monkeytype/commit/d6d062a77132ba7d6ba3b482d46ae329d3b8d695","tags":["x_refsource_MISC"],"url":"https://github.com/monkeytypegame/monkeytype/commit/d6d062a77132ba7d6ba3b482d46ae329d3b8d695"}],"affected":[{"vendor":"monkeytypegame","product":"monkeytype","versions":[{"version":"<= 25.49.0","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2025-12-04T22:34:10.010Z"},"descriptions":[{"lang":"en","value":"Monkeytype is a minimalistic and customizable typing test. In 25.49.0 and earlier, there is improper handling of user input which allows an attacker to execute malicious javascript on anyone viewing a malicious quote submission. quote.text and quote.source are user input, and they're inserted straight into the DOM. If they contain HTML tags, they will be rendered (after some escaping using quotes and textarea tags)."}],"source":{"advisory":"GHSA-mfjh-9552-8g27","discovery":"UNKNOWN"}},"adp":[{"references":[{"url":"https://github.com/monkeytypegame/monkeytype/security/advisories/GHSA-mfjh-9552-8g27","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-05T14:59:34.176595Z","id":"CVE-2025-66563","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-05T14:59:45.465Z"}}]}}