Click-to-Call for Twilio - Reflected cross-site scripting (XSS)
4,8
Medium
Summary
Full name
Click-to-Call for Twilio twili - Reflected cross-site scripting (XSS)
Code name
State
Private
Release date
14 mar 2025
Affected product
Click-to-Call for Twilio
Affected version(s)
Version twili
Vulnerability name
Reflected cross-site scripting (XSS)
Vulnerability type
Remotely exploitable
No
CVSS v4.0 vector string
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:L/VA:L/SC:L/SI:L/SA:L/E:U
CVSS v4.0 base score
4.8
Exploit available
No
CVE ID(s)
Description
Click-to-Call for Twilio twili was found to be vulnerable. The web application dynamically generates web content without validating the source of the potentially untrusted data in myapp/lib/outbound.php.
Vulnerability
Skims by Fluid Attacks discovered a Reflected cross-site scripting (XSS) in Click-to-Call for Twilio twili. The following is the output of the tool:
Skims output
Our security policy
We have reserved the ID CVE-2025-31288 to refer to this issue from now on. Disclosure policy
System Information
Product: Click-to-Call for Twilio
Version: twili
Mitigation
There is currently no patch available for this vulnerability.
Timeline
IA generativa
14 mar 2025
Vendor contacted
14 mar 2025