GHSA-ffq5-qpvf-xq7x: OpenC3 COSMOS is Vulnerable to Self-XSS Through the Command Sender
The Command Sender UI uses an unsafe eval() function on array-like command parameters, which allows a user-supplied payload to execute in the browser when sending a command. This creates a self-XSS risk because an attacker can trigger their own script execution in the victim’s session, if allowed to influence the array parameter input, for example via phishing. If successful, an attacker may read or modify data in the authenticated browser context, including session tokens in local storage.
References
Code Behaviors & Features
Detect and mitigate GHSA-ffq5-qpvf-xq7x with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →