Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24638: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pddring Create with Code

0
Unknown
VulnerabilityCVE-2025-24638cvecve-2025-24638
Published: Fri Jan 24 2025 (01/24/2025, 17:24:39 UTC)
Source: CVE Database V5
Vendor/Project: pddring
Product: Create with Code

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in pddring Create with Code create-with-code allows DOM-Based XSS.This issue affects Create with Code: from n/a through <= 1.4.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 21:21:40 UTC

Technical Analysis

CVE-2025-24638 identifies a DOM-based Cross-site Scripting (XSS) vulnerability in the 'Create with Code' software developed by pddring, affecting all versions up to and including 1.4. The vulnerability stems from improper neutralization of user-supplied input during the generation of web pages, which allows attackers to inject malicious scripts that execute in the victim's browser context. Unlike traditional reflected or stored XSS, DOM-based XSS occurs entirely on the client side, where the web application’s client-side scripts process untrusted data insecurely, leading to script injection. This flaw can be exploited by tricking users into visiting a specially crafted URL or interacting with manipulated page elements, resulting in execution of arbitrary JavaScript code. Potential consequences include theft of session cookies, redirection to malicious sites, or unauthorized actions performed on behalf of the user. The vulnerability affects the Create with Code product, which is a web development tool or framework, though specific market penetration data is limited. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The absence of a CVSS score necessitates an expert severity assessment based on impact and exploitability factors.

Potential Impact

The impact of this DOM-based XSS vulnerability can be significant for organizations using the Create with Code product. Successful exploitation can compromise user confidentiality by stealing session tokens or sensitive data accessible via the browser. It can also affect integrity by enabling attackers to perform unauthorized actions or manipulate displayed content, and availability if malicious scripts disrupt normal application behavior. Since exploitation requires only that a user visit a maliciously crafted page or link, the attack surface is broad and can be leveraged in phishing campaigns or drive-by attacks. Organizations with web applications built on this product risk reputational damage, regulatory penalties if user data is compromised, and potential financial losses. The lack of known exploits currently reduces immediate risk, but the vulnerability’s presence in a development tool means many downstream applications could be affected, amplifying potential impact globally.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first monitor for official patches or updates from pddring and apply them promptly once available. In the interim, developers should review and sanitize all client-side input processing code to ensure proper input validation and output encoding, particularly when manipulating the DOM with user-supplied data. Implementing a robust Content Security Policy (CSP) can help restrict the execution of unauthorized scripts and reduce the risk of exploitation. Security teams should conduct thorough code audits and penetration testing focusing on client-side script handling. Additionally, educating users about phishing risks and suspicious links can reduce the likelihood of successful exploitation. Employing web application firewalls (WAFs) with rules targeting XSS patterns may provide temporary protection. Finally, organizations should inventory all applications built with Create with Code to assess exposure and prioritize remediation efforts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-01-23T14:51:34.072Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd7271e6bfc5ba1dee9fb1

Added to database: 4/1/2026, 7:30:57 PM

Last enriched: 4/1/2026, 9:21:40 PM

Last updated: 4/6/2026, 3:06:37 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses