CVE-2020-12670

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-12670
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-12670.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-12670
Related
Published
2020-10-12T16:15:12.437Z
Modified
2025-11-20T11:09:42.657654Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

XSS exists in Webmin 1.941 and earlier affecting the Save function of the Read User Email Module / mailboxes Endpoint when attempting to save HTML emails. This module parses any output without sanitizing SCRIPT elements, as opposed to the View function, which sanitizes the input correctly. A malicious user can send any JavaScript payload into the message body and execute it if the user decides to save that email.

References

Affected packages

Git / github.com/webmin/webmin

Affected ranges

Type
GIT
Repo
https://github.com/webmin/webmin
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

1.*

1.700
1.710
1.720
1.730
1.740
1.750
1.760
1.770
1.780
1.790
1.800
1.801
1.810
1.820
1.830
1.831
1.840
1.850
1.860
1.870
1.880
1.890
1.900
1.910
1.920
1.930
1.940
1.941

Database specific

source

"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-12670.json"