Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. twitter-fetcher-js
  4. ›
  5. CVE-2018-25058

CVE-2018-25058: Twitter-Post-Fetcher vulnerable to Use of Web Link to Untrusted Target with window.opener Access

December 29, 2022 (updated January 9, 2023)

A vulnerability classified as problematic has been found in Twitter-Post-Fetcher up to 17.x. This affects an unknown part of the file js/twitterFetcher.js of the component Link Target Handler. The manipulation leads to use of web link to untrusted target with window.opener access. It is possible to initiate the attack remotely. Upgrading to version 18.0.0 is able to address this issue. The name of the patch is 7d281c6fb5acbc29a2cad295262c1f0c19ca56f3. It is recommended to upgrade the affected component. The identifier VDB-217017 was assigned to this vulnerability.

References

  • github.com/advisories/GHSA-m688-cx2p-rgq9
  • github.com/jasonmayes/Twitter-Post-Fetcher/commit/7d281c6fb5acbc29a2cad295262c1f0c19ca56f3
  • github.com/jasonmayes/Twitter-Post-Fetcher/pull/170
  • github.com/jasonmayes/Twitter-Post-Fetcher/releases/tag/18.0.0
  • nvd.nist.gov/vuln/detail/CVE-2018-25058
  • vuldb.com/?ctiid.217017
  • vuldb.com/?id.217017

Code Behaviors & Features

Detect and mitigate CVE-2018-25058 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 18.0.0

Fixed versions

  • 18.0.0

Solution

Upgrade to version 18.0.0 or above.

Impact 6.1 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Learn more about CVSS

Source file

npm/twitter-fetcher-js/CVE-2018-25058.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:38 +0000.