Flight is an extensible micro-framework for PHP. Prior to 3.18.1, Flight::jsonp() concatenates the ?jsonp= query parameter directly into an application/javascript response body without validating that the value is a legal JavaScript identifier. An attacker can inject arbitrary JavaScript that executes in the response origin, enabling reflected cross-site scripting. This vulnerability is fixed in 3.18.1.
Metrics
Affected Vendors & Products
References
History
Wed, 13 May 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Flight is an extensible micro-framework for PHP. Prior to 3.18.1, Flight::jsonp() concatenates the ?jsonp= query parameter directly into an application/javascript response body without validating that the value is a legal JavaScript identifier. An attacker can inject arbitrary JavaScript that executes in the response origin, enabling reflected cross-site scripting. This vulnerability is fixed in 3.18.1. | |
| Title | Flight: Reflected XSS via unvalidated JSONP callback in Flight::jsonp() | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-13T19:21:44.125Z
Reserved: 2026-04-28T16:56:50.191Z
Link: CVE-2026-42548
No data.
Status : Received
Published: 2026-05-13T20:16:21.787
Modified: 2026-05-13T20:16:21.787
Link: CVE-2026-42548
No data.
OpenCVE Enrichment
Updated: 2026-05-13T21:45:05Z