VYPR
Moderate severityNVD Advisory· Published Mar 20, 2025· Updated Mar 20, 2025

Stored XSS in modelscope/agentscope

CVE-2024-8556

Description

A stored cross-site scripting (XSS) vulnerability exists in modelscope/agentscope, as of the latest commit 21161fe on the main branch. The vulnerability occurs in the view for inspecting detailed run information, where a user-controllable string (run ID) is appended and rendered as HTML. This allows an attacker to execute arbitrary JavaScript code in the context of the user's browser.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A stored XSS vulnerability in modelscope/agentscope allows attackers to execute arbitrary JavaScript by injecting malicious code into the run ID, which is rendered unsanitized in the run details view.

Vulnerability

Overview

A stored cross-site scripting (XSS) vulnerability exists in modelscope/agentscope, as of commit 21161fe on the main branch [1]. The root cause is that the run ID, a user-controllable string, is directly appended and rendered as HTML in the view for inspecting detailed run information without proper sanitization [2]. This allows an attacker to inject arbitrary HTML and JavaScript code.

Exploitation

An attacker can exploit this vulnerability by providing a malicious run ID, for example through the API or interface that creates or updates runs. When any user (including the attacker or other victims) views the detailed run information page, the injected script executes in the context of that user's browser. The vulnerable code is located in the dashboard.js file at line 90 [3]. No authentication is required beyond the ability to set a run ID, making this a low-barrier attack.

Impact

Successful exploitation leads to arbitrary JavaScript execution, enabling the attacker to steal cookies, session tokens, or perform actions on behalf of the victim. The vulnerability is classified as stored XSS, meaning the payload persists and affects all users who view the compromised run details. The Huntr bounty platform has acknowledged this vulnerability [4].

Mitigation

As of the latest commit (21161fe), no patch has been released. Users are advised to avoid viewing run details from untrusted sources or to apply input sanitization to the run ID field. The maintainers have been notified via the Huntr bounty report [4].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
agentscopePyPI
<= 0.1.1

Affected products

3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.