Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2026-32732
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
XSS in @leanprover/unicode-input-component
Source: NVD (National Vulnerability Database)
Vulnerability Description
Lean 4 VS Code Extension is a Visual Studio Code extension for the Lean 4 proof assistant. Projects that use @leanprover/unicode-input-component are vulnerable to an XSS exploit in 0.1.9 of the package and lower. The component re-inserted text in the input element back into the input element as unescaped HTML. The issue has been resolved in 0.2.0.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
Web页面中脚本相关HTML标签转义处理不恰当(基本跨站脚本)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Lean 4 VS Code Extension 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Lean 4 VS Code Extension是Lean开源的一个VS Code扩展插件。 Lean 4 VS Code Extension 0.1.9及之前版本存在安全漏洞,该漏洞源于@leanprover/unicode-input-component组件将输入元素中的文本作为未转义的HTML重新插入,可能导致跨站脚本攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
leanprovervscode-lean4 < 0.2.0 -
II. Public POCs for CVE-2026-32732
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2026-32732
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2026-32732

No comments yet


Leave a comment