### [CVE-2023-42808](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42808) ![](https://img.shields.io/static/v1?label=Product&message=common-voice&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%3D%201.88.2%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen) ### Description Common Voice is the web app for Mozilla Common Voice, a platform for collecting speech donations in order to create public domain datasets for training voice recognition-related tools. Version 1.88.2 is vulnerable to reflected Cross-Site Scripting given that user-controlled data flows to a path expression (path of a network request). This issue may lead to reflected Cross-Site Scripting (XSS) in the context of Common Voice’s server origin. As of time of publication, it is unknown whether any patches or workarounds exist. ### POC #### Reference - https://securitylab.github.com/advisories/GHSL-2023-026_Common_Voice/ #### Github No PoCs found on GitHub currently.