{"uuid": "6b327404-e946-4bdf-90a7-d8612a41acb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0192", "type": "seen", "source": "https://t.me/cvedetector/20721", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-0192 - Wandb OpenUI Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2025-0192 \nPublished : March 20, 2025, 10:15 a.m. | 1\u00a0hour, 40\u00a0minutes ago \nDescription : A stored Cross-site Scripting (XSS) vulnerability exists in the latest version of wandb/openui. The vulnerability is present in the edit HTML functionality, where an attacker can inject malicious scripts. When the modified HTML is shared with another user, the XSS payload executes, potentially leading to the theft of user prompt history and other sensitive information. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-20T13:13:16.000000Z"}