PyPi: Esphome

CVE-2024-27287

Safety vulnerability ID: 78713

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Mar 06, 2024 Updated at Oct 09, 2025
Scan your Python projects for vulnerabilities →

Advisory

Affected versions of the esphome package are vulnerable to Cross-Site Scripting (XSS) due to unsanitized content being served with an HTML content type. The /edit endpoint in the dashboard component allows a remote authenticated user to inject arbitrary JavaScript into configuration files without sanitization, and that script is subsequently rendered with `Content-Type: text/html; charset=UTF-8`. An attacker who is authenticated can craft a POST to `/edit?configuration=[file]` that includes a malicious script and then have a victim visit `/edit?configuration=[file]`, enabling exfiltration of session cookies and unauthorized operations such as reading, editing, deleting configuration files and flashing firmware on managed boards.

Affected package

esphome

Latest version: 2025.9.3

ESPHome is a system to configure your microcontrollers by simple yet powerful configuration files and control them remotely through Home Automation systems.

Affected versions

Fixed versions

Vulnerability changelog

This vulnerability has no description

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

MEDIUM 6.5

CVSS v3 Details

MEDIUM 6.5
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
HIGH
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
HIGH
Integrity Impact (I)
HIGH
Availability Availability (A)
NONE