CVE-2023-7215: CWE-79 Cross Site Scripting in Chanzhaoyu chatgpt-web
A vulnerability, which was classified as problematic, has been found in Chanzhaoyu chatgpt-web 2.11.1. This issue affects some unknown processing. The manipulation of the argument Description with the input <image src onerror=prompt(document.domain)> leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249779.
AI Analysis
Technical Summary
CVE-2023-7215 is a cross-site scripting (XSS) vulnerability identified in version 2.11.1 of the Chanzhaoyu chatgpt-web application. The vulnerability arises from improper input validation and sanitization of the 'Description' argument, which allows an attacker to inject malicious HTML/JavaScript code. Specifically, the exploit involves injecting an image tag with an onerror event handler, such as <image src onerror=prompt(document.domain)>, which triggers a JavaScript prompt displaying the domain name. This vulnerability is classified under CWE-79, indicating it is a reflected or stored XSS issue. The attack can be initiated remotely without requiring authentication, but user interaction is necessary to trigger the malicious script execution (e.g., by viewing a crafted page or input). The CVSS v3.1 base score is 3.5, indicating a low severity level, primarily because the impact on confidentiality is none, integrity impact is low, and availability impact is none. The vulnerability does not appear to have known exploits in the wild yet, and no official patches have been linked or published at this time. However, the public disclosure of the exploit details increases the risk of exploitation attempts. The vulnerability could allow attackers to execute arbitrary scripts in the context of the victim's browser session, potentially leading to session hijacking, phishing, or defacement if combined with other weaknesses.
Potential Impact
For European organizations using the Chanzhaoyu chatgpt-web 2.11.1 application, this vulnerability could lead to targeted XSS attacks that compromise user sessions or trick users into performing unintended actions. While the direct impact on confidentiality is minimal, the integrity of user interactions and data could be compromised. Attackers could leverage this vulnerability to conduct social engineering attacks or steal session tokens if the application handles sensitive data or authentication cookies insecurely. The risk is heightened in environments where chatgpt-web is integrated with internal communication or customer-facing portals, potentially exposing employees or customers to malicious scripts. Given the low CVSS score and the requirement for user interaction, the threat is moderate but should not be ignored, especially in sectors with strict data protection regulations such as GDPR. Failure to address this vulnerability could lead to reputational damage and regulatory scrutiny if exploited to compromise personal data.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement strict input validation and output encoding on all user-supplied data, particularly the 'Description' field in chatgpt-web. Employing Content Security Policy (CSP) headers can reduce the impact of XSS by restricting the execution of unauthorized scripts. Regularly updating the application to the latest version once a patch is released is critical. In the absence of an official patch, organizations should consider applying temporary workarounds such as disabling or sanitizing the affected input fields, or using web application firewalls (WAFs) configured to detect and block typical XSS payloads. Additionally, educating users about the risks of interacting with suspicious links or inputs can reduce the likelihood of successful exploitation. Monitoring logs for unusual activity related to the Description parameter can help detect attempted attacks early.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2023-7215: CWE-79 Cross Site Scripting in Chanzhaoyu chatgpt-web
Description
A vulnerability, which was classified as problematic, has been found in Chanzhaoyu chatgpt-web 2.11.1. This issue affects some unknown processing. The manipulation of the argument Description with the input <image src onerror=prompt(document.domain)> leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249779.
AI-Powered Analysis
Technical Analysis
CVE-2023-7215 is a cross-site scripting (XSS) vulnerability identified in version 2.11.1 of the Chanzhaoyu chatgpt-web application. The vulnerability arises from improper input validation and sanitization of the 'Description' argument, which allows an attacker to inject malicious HTML/JavaScript code. Specifically, the exploit involves injecting an image tag with an onerror event handler, such as <image src onerror=prompt(document.domain)>, which triggers a JavaScript prompt displaying the domain name. This vulnerability is classified under CWE-79, indicating it is a reflected or stored XSS issue. The attack can be initiated remotely without requiring authentication, but user interaction is necessary to trigger the malicious script execution (e.g., by viewing a crafted page or input). The CVSS v3.1 base score is 3.5, indicating a low severity level, primarily because the impact on confidentiality is none, integrity impact is low, and availability impact is none. The vulnerability does not appear to have known exploits in the wild yet, and no official patches have been linked or published at this time. However, the public disclosure of the exploit details increases the risk of exploitation attempts. The vulnerability could allow attackers to execute arbitrary scripts in the context of the victim's browser session, potentially leading to session hijacking, phishing, or defacement if combined with other weaknesses.
Potential Impact
For European organizations using the Chanzhaoyu chatgpt-web 2.11.1 application, this vulnerability could lead to targeted XSS attacks that compromise user sessions or trick users into performing unintended actions. While the direct impact on confidentiality is minimal, the integrity of user interactions and data could be compromised. Attackers could leverage this vulnerability to conduct social engineering attacks or steal session tokens if the application handles sensitive data or authentication cookies insecurely. The risk is heightened in environments where chatgpt-web is integrated with internal communication or customer-facing portals, potentially exposing employees or customers to malicious scripts. Given the low CVSS score and the requirement for user interaction, the threat is moderate but should not be ignored, especially in sectors with strict data protection regulations such as GDPR. Failure to address this vulnerability could lead to reputational damage and regulatory scrutiny if exploited to compromise personal data.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement strict input validation and output encoding on all user-supplied data, particularly the 'Description' field in chatgpt-web. Employing Content Security Policy (CSP) headers can reduce the impact of XSS by restricting the execution of unauthorized scripts. Regularly updating the application to the latest version once a patch is released is critical. In the absence of an official patch, organizations should consider applying temporary workarounds such as disabling or sanitizing the affected input fields, or using web application firewalls (WAFs) configured to detect and block typical XSS payloads. Additionally, educating users about the risks of interacting with suspicious links or inputs can reduce the likelihood of successful exploitation. Monitoring logs for unusual activity related to the Description parameter can help detect attempted attacks early.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-05T12:56:44.805Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f0dc2182aa0cae27ff3f9
Added to database: 6/3/2025, 2:59:14 PM
Last enriched: 7/4/2025, 1:54:58 AM
Last updated: 8/11/2025, 2:57:04 AM
Views: 11
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.