Stored Cross-Site Scripting (XSS) in TelegAI (telegai.com) 2025-05-26 in its chat component and character container component. An attacker can achieve arbitrary client-side script execution by crafting an AI Character with SVG XSS payloads in either description, greeting, example dialog, or system prompt(instructing the LLM to embed XSS payload in its chat response). When a user interacts with such a malicious AI Character or just browse its profile, the script executes in the user's browser. Successful exploitation can lead to the theft of sensitive information, such as session tokens, potentially resulting in account hijacking.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://github.com/Secsys-FDU/CVE-2025-51860 |
![]() ![]() |
History
Tue, 22 Jul 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-79 | |
Metrics |
cvssV3_1
|
Tue, 22 Jul 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Stored Cross-Site Scripting (XSS) in TelegAI (telegai.com) 2025-05-26 in its chat component and character container component. An attacker can achieve arbitrary client-side script execution by crafting an AI Character with SVG XSS payloads in either description, greeting, example dialog, or system prompt(instructing the LLM to embed XSS payload in its chat response). When a user interacts with such a malicious AI Character or just browse its profile, the script executes in the user's browser. Successful exploitation can lead to the theft of sensitive information, such as session tokens, potentially resulting in account hijacking. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-07-22T00:00:00.000Z
Updated: 2025-07-22T16:07:47.174Z
Reserved: 2025-06-16T00:00:00.000Z
Link: CVE-2025-51860

Updated: 2025-07-22T16:07:43.093Z

Status : Awaiting Analysis
Published: 2025-07-22T15:15:36.743
Modified: 2025-07-25T15:29:44.523
Link: CVE-2025-51860

No data.