CVE-2021-28001

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-28001
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-28001.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-28001
Published
2021-08-19T14:39:31Z
Modified
2025-01-14T09:02:40.449629Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

A cross-site scripting vulnerability was discovered in the Comments parameter in Textpattern CMS 4.8.4 which allows remote attackers to execute arbitrary code via a crafted payload entered into the URL field. The vulnerability is triggered by users visiting https://site.com/articles/welcome-to-your-site#comments-head.

References

Affected packages

Git / github.com/textpattern/textpattern

Affected ranges

Type
GIT
Repo
https://github.com/textpattern/textpattern
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

4.*

4.2.0
4.3.0
4.4.0
4.4.1
4.5.0
4.5.1
4.5.2
4.6.0
4.6.0-beta
4.6.0-beta.2
4.6.0-beta.3
4.6.1
4.6.2
4.7.0
4.7.0-beta
4.7.0-beta.2
4.7.0-beta.3
4.7.0-rc.1
4.7.1
4.7.2
4.7.3
4.8.0
4.8.0-beta
4.8.0-beta.2
4.8.0-beta.3
4.8.1
4.8.2
4.8.3
4.8.4