The Command Sender UI uses an unsafe eval() function on array-like command parameters, which allows a user-supplied payload to execute in the browser when sending a command. This creates a self-XSS risk because an attacker can trigger their own script execution in the victim’s session, if allowed to influence the array parameter input, for example via phishing. If successful, an attacker may read or modify data in the authenticated browser context, including session tokens in local storage.
The unsafe eval() usage on user-supplied ARRAY parameters happens in convertToValue method in CommandSender.vue
Below example uses INST ARYCMD to execute simple JavaScript code snippet alert(“XSS”).
<img width="947" height="356" alt="image" src="https://github.com/user-attachments/assets/6fbdb6c9-616a-4268-bbb8-a8a1044437ad" />
Local JavaScript execution in the user's browser
7.0.0Exploitability
AV:NAC:LPR:LUI:RScope
S:UImpact
C:LI:LA:N4.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N