Code Execution Vulnerability in Orejime Consent Manager by Boscop
CVE-2025-68457
What is CVE-2025-68457?
The Orejime consent manager, utilized for handling user consent in an accessible manner, has a vulnerability that permits the execution of malicious JavaScript code through manipulated data attributes. Specifically, in versions before 2.3.2, attackers could inject HTML containing javascript: links, which Orejime mistakenly converts into executable attributes upon user consent confirmation. Although this risk is minimal under typical circumstances, it becomes significant if an attacker gains the ability to insert HTML into pages. The issue has been addressed in version 2.3.2, and user mitigation can be achieved by sanitizing data attributes to eliminate potential script execution.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
orejime < 2.3.2
References
CVSS V4
Timeline
Vulnerability published
Vulnerability Reserved
