Skip to content

Reflected XSS in RSS Single Watch Error Response <= (v0.53.6)

Moderate
dgtlmoon published GHSA-mw8m-398g-h89w Feb 23, 2026

Package

pip changedetection.io (pip)

Affected versions

<= 0.53.6

Patched versions

0.54.1

Description

Summary

Three security vulnerabilities were identified in changedetection.io through source code review and live validation against a locally deployed Docker instance. All vulnerabilities were confirmed exploitable on the latest version (0.53.6) it was additionally validated at scale against 500 internet-facing instances discovered via FOFA search engine, producing 5K+ confirmed detections using a custom Nuclei template, demonstrating widespread real-world impact.
The RSS single-watch endpoint reflects the UUID path parameter directly in the HTTP response body without HTML escaping. Since Flask returns text/html by default for plain string responses, the browser parses and executes injected JavaScript.

Details

File: changedetectionio/blueprint/rss/single_watch.py (lines ~45 and ~50)

The UUID parameter from the URL path is interpolated into the response body using an f-string with no escaping:

Line ~45

watch = datastore.data['watching'].get(uuid)
if not watch:
    return f"Watch with UUID {uuid} not found", 404  # ← No escaping, Content-Type: text/html

Line ~50

if len(dates) < 2:
    return f"Watch {uuid} does not have enough history snapshots...", 400  # ← Same issue
Flask's default Content-Type for plain string responses is text/html; charset=utf-8, so any HTML/JavaScript in {uuid} is rendered by the browser.

Attack Vector

The attack requires a valid RSS access token, which is a 32-character hex string exposed in the HTML tag on the homepage without authentication:

Attacker visits the target's homepage if it unauthenticathed and extracts the RSS token from the tag
Crafts a malicious URL:

  1. http://target:5000/rss/watch/%3Cimg%20src%3Dx%20onerror%3Dalert(document.cookie)%3E?token=EXTRACTED_TOKEN
  2. Sends the link to a victim who has an active session on the changedetection.io instance
  3. When the victim clicks the link, the server responds with:
  4. Watch with UUID not found

The browser renders the tag, the onerror fires, and JavaScript executes in the victim's session context

PoC

Request:

GET /rss/watch/%3Cimg%20src%3Dx%20onerror%3Dalert(document.cookie)%3E?token=223e7edbbfee2268f5abb5344919054e HTTP/1.1
Host: [127.0.0.1:5000](http://127.0.0.1:5000/)

Response:

HTTP/1.1 404 NOT FOUND
Content-Type: text/html; charset=utf-8

Watch with UUID not found

image

The XSS payload is reflected unescaped in an HTML response. The browser executes alert(document.cookie).

Lots of intances over internet affected to this.
image

Impact

  • Session cookie theft via document.cookie exfiltration
  • Account takeover if session cookies lack HttpOnly flag
  • Phishing via crafted links that appear to originate from a trusted changedetection.io instance
  • Token is obtainable without authentication from the homepage tag, lowering the barrier to exploitation

We are happy to work with your team on validating and addressing these issues. Please confirm receipt of this report and let us know your preferred timeline for coordinating the fix.

Best regards,
Roberto Nunes

Severity

Moderate

CVSS overall score

This score calculates overall vulnerability severity from 0 to 10 and is based on the Common Vulnerability Scoring System (CVSS).
/ 10

CVSS v3 base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None

CVSS v3 base metrics

Attack vector: More severe the more the remote (logically and physically) an attacker can be in order to exploit the vulnerability.
Attack complexity: More severe for the least complex attacks.
Privileges required: More severe if no privileges are required.
User interaction: More severe when no user interaction is required.
Scope: More severe when a scope change occurs, e.g. one vulnerable component impacts resources in components beyond its security scope.
Confidentiality: More severe when loss of data confidentiality is highest, measuring the level of data access available to an unauthorized user.
Integrity: More severe when loss of data integrity is the highest, measuring the consequence of data modification possible by an unauthorized user.
Availability: More severe when the loss of impacted component availability is highest.
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

CVE ID

CVE-2026-27645

Weaknesses

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. Learn more on MITRE.

Credits