Vulnerabilites related to The-Scratch-Channel - the-scratch-channel.github.io
CVE-2025-55301 (GCVE-0-2025-55301)
Vulnerability from cvelistv5
Published
2025-08-25 15:38
Modified
2025-08-25 16:03
CWE
  • CWE-20 - Improper Input Validation
Summary
The Scratch Channel is a news website. In version 1, it is possible to go to application in devtools and click local storage to edit the account's username locally. This issue has been patched in version 1.1.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-55301",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-08-25T16:03:11.062852Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-25T16:03:22.618Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "the-scratch-channel.github.io",
          "vendor": "The-Scratch-Channel",
          "versions": [
            {
              "status": "affected",
              "version": "= 1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The Scratch Channel is a news website. In version 1, it is possible to go to application in devtools and click local storage to edit the account\u0027s username locally. This issue has been patched in version 1.1."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20: Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-08-25T15:38:34.391Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/The-Scratch-Channel/tsc-web-client/security/advisories/GHSA-9q4f-4vjm-7gp2",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/The-Scratch-Channel/tsc-web-client/security/advisories/GHSA-9q4f-4vjm-7gp2"
        },
        {
          "name": "https://github.com/The-Scratch-Channel/tsc-web-client/discussions/77",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/The-Scratch-Channel/tsc-web-client/discussions/77"
        },
        {
          "name": "https://github.com/The-Scratch-Channel/tsc-web-client/releases/tag/v1.1",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/The-Scratch-Channel/tsc-web-client/releases/tag/v1.1"
        }
      ],
      "source": {
        "advisory": "GHSA-9q4f-4vjm-7gp2",
        "discovery": "UNKNOWN"
      },
      "title": "The Scratch Channel Allows Username Modification"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2025-55301",
    "datePublished": "2025-08-25T15:38:34.391Z",
    "dateReserved": "2025-08-12T16:15:30.238Z",
    "dateUpdated": "2025-08-25T16:03:22.618Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-53903 (GCVE-0-2025-53903)
Vulnerability from cvelistv5
Published
2025-07-15 18:22
Modified
2025-07-15 18:36
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
The Scratch Channel is a news website that is under development as of time of this writing. The file `/api/users.js` doesn't properly sanitize text box inputs, leading to a potential vulnerability to cross-site scripting attacks. Commit 90b39eb56b27b2bac29001abb1a3cac0964b8ddb addresses this issue.
Impacted products
Vendor Product Version
The-Scratch-Channel the-scratch-channel.github.io Version: < 90b39eb56b27b2bac29001abb1a3cac0964b8ddb
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-53903",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-07-15T18:36:43.427151Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-07-15T18:36:46.822Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "exploit"
            ],
            "url": "https://github.com/The-Scratch-Channel/the-scratch-channel.github.io/security/advisories/GHSA-25wp-g9g6-7fr9"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "the-scratch-channel.github.io",
          "vendor": "The-Scratch-Channel",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 90b39eb56b27b2bac29001abb1a3cac0964b8ddb"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The Scratch Channel is a news website that is under development as of time of this writing. The file `/api/users.js` doesn\u0027t properly sanitize text box inputs, leading to a potential vulnerability to cross-site scripting attacks. Commit 90b39eb56b27b2bac29001abb1a3cac0964b8ddb addresses this issue."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 1.3,
            "baseSeverity": "LOW",
            "privilegesRequired": "NONE",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "LOW",
            "subIntegrityImpact": "LOW",
            "userInteraction": "PASSIVE",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:U",
            "version": "4.0",
            "vulnAvailabilityImpact": "NONE",
            "vulnConfidentialityImpact": "NONE",
            "vulnIntegrityImpact": "NONE"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-15T18:22:37.438Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/The-Scratch-Channel/the-scratch-channel.github.io/security/advisories/GHSA-25wp-g9g6-7fr9",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/The-Scratch-Channel/the-scratch-channel.github.io/security/advisories/GHSA-25wp-g9g6-7fr9"
        },
        {
          "name": "https://github.com/The-Scratch-Channel/the-scratch-channel.github.io/commit/90b39eb56b27b2bac29001abb1a3cac0964b8ddb",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/The-Scratch-Channel/the-scratch-channel.github.io/commit/90b39eb56b27b2bac29001abb1a3cac0964b8ddb"
        }
      ],
      "source": {
        "advisory": "GHSA-25wp-g9g6-7fr9",
        "discovery": "UNKNOWN"
      },
      "title": "The Scratch Channel Has Potential Cross-Site Scripting (XSS) Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2025-53903",
    "datePublished": "2025-07-15T18:22:37.438Z",
    "dateReserved": "2025-07-11T19:05:23.826Z",
    "dateUpdated": "2025-07-15T18:36:46.822Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-53904 (GCVE-0-2025-53904)
Vulnerability from cvelistv5
Published
2025-07-16 17:02
Modified
2025-07-18 14:27
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
  • CWE-692 - Incomplete Denylist to Cross-Site Scripting
Summary
The Scratch Channel is a news website that is under development as of time of this writing. The file `/api/admin.js` contains code that could make the website vulnerable to cross-site scripting. No known patches exist as of time of publication.
Impacted products
Vendor Product Version
The-Scratch-Channel the-scratch-channel.github.io Version: <= b66a1cae45e05ad8971aecd96c3322520f8a5725
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-53904",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-07-18T14:27:31.529191Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-07-18T14:27:37.622Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "the-scratch-channel.github.io",
          "vendor": "The-Scratch-Channel",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c= b66a1cae45e05ad8971aecd96c3322520f8a5725"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The Scratch Channel is a news website that is under development as of time of this writing. The file `/api/admin.js` contains code that could make the website vulnerable to cross-site scripting. No known patches exist as of time of publication."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 1.3,
            "baseSeverity": "LOW",
            "privilegesRequired": "NONE",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "LOW",
            "subIntegrityImpact": "LOW",
            "userInteraction": "PASSIVE",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:U",
            "version": "4.0",
            "vulnAvailabilityImpact": "NONE",
            "vulnConfidentialityImpact": "NONE",
            "vulnIntegrityImpact": "NONE"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-692",
              "description": "CWE-692: Incomplete Denylist to Cross-Site Scripting",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-16T17:02:01.404Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/The-Scratch-Channel/the-scratch-channel.github.io/security/advisories/GHSA-hgh4-pj74-f5rr",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/The-Scratch-Channel/the-scratch-channel.github.io/security/advisories/GHSA-hgh4-pj74-f5rr"
        },
        {
          "name": "https://github.com/The-Scratch-Channel/the-scratch-channel.github.io/blob/main/api/admin.js#L18",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/The-Scratch-Channel/the-scratch-channel.github.io/blob/main/api/admin.js#L18"
        }
      ],
      "source": {
        "advisory": "GHSA-hgh4-pj74-f5rr",
        "discovery": "UNKNOWN"
      },
      "title": "The Scratch Channel Has Potential Reflected Cross-Site Scripting (XSS) Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2025-53904",
    "datePublished": "2025-07-16T17:02:01.404Z",
    "dateReserved": "2025-07-11T19:05:23.826Z",
    "dateUpdated": "2025-07-18T14:27:37.622Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}