CVE-2026-6493 PUBLISHED

lukevella rallly Reset Password reset-password-form.tsx cross site scripting

Assigner: VulDB
Reserved: 17.04.2026 Published: 17.04.2026 Updated: 17.04.2026

A flaw has been found in lukevella rallly up to 4.7.4. This affects an unknown function of the file apps/web/src/app/[locale]/(auth)/reset-password/components/reset-password-form.tsx of the component Reset Password Handler. Executing a manipulation of the argument redirectTo can lead to cross site scripting. The attack can be executed remotely. The exploit has been published and may be used. Upgrading to version 4.8.0 mitigates this issue. Upgrading the affected component is advised. The vendor was contacted early about this disclosure.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P
CVSS Score: 5.1

Product Status

Vendor lukevella
Product rallly
Versions
  • Version 4.7.0 is affected
  • Version 4.7.1 is affected
  • Version 4.7.2 is affected
  • Version 4.7.3 is affected
  • Version 4.7.4 is affected
  • Version 4.8.0 is unaffected

Credits

  • trebledj (VulDB User) reporter
  • VulDB CNA Team coordinator

References

Problem Types

  • Cross Site Scripting CWE
  • Code Injection CWE