CVE-2021-25959

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-25959
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-25959.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-25959
Aliases
Published
2021-09-29T14:15:07Z
Modified
2024-05-30T02:56:18.343109Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

In OpenCRX, versions v4.0.0 through v5.1.0 are vulnerable to reflected Cross-site Scripting (XSS), due to unsanitized parameters in the password reset functionality. This allows execution of external javascript files on any user of the openCRX instance.

References

Affected packages

Git / github.com/opencrx/opencrx

Affected ranges

Type
GIT
Repo
https://github.com/opencrx/opencrx
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

opencrx-v4.*

opencrx-v4.0.0
opencrx-v4.1.0
opencrx-v4.2.0
opencrx-v4.3.0
opencrx-v4.3.0-rc.1

opencrx-v5.*

opencrx-v5.0-20200714
opencrx-v5.0-20200715
opencrx-v5.0-20200717
opencrx-v5.0-20200904
opencrx-v5.0.0
opencrx-v5.0.1
opencrx-v5.1.0