CVE-2020-15178

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-15178
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-15178.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-15178
Aliases
Published
2020-09-15T18:15:13Z
Modified
2024-05-15T01:12:58.205428Z
Severity
  • 9.3 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N CVSS Calculator
Summary
[none]
Details

In PrestaShop contactform module (prestashop/contactform) before version 4.3.0, an attacker is able to inject JavaScript while using the contact form. The message field was incorrectly unescaped, possibly allowing attackers to execute arbitrary JavaScript in a victim's browser.

References

Affected packages

Git / github.com/prestashop/contactform

Affected ranges

Type
GIT
Repo
https://github.com/prestashop/contactform
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v1.*

v1.0.1

v2.*

v2.0.0
v2.0.1
v2.0.2

v3.*

v3.0.0

v4.*

v4.0.0
v4.1.0
v4.1.1