CVE-2024-22414

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-22414
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-22414.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-22414
Aliases
  • GHSA-mrcw-j96f-p6v6
Published
2024-01-17T20:25:29.629Z
Modified
2025-12-05T03:12:57.791665Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L CVSS Calculator
Summary
User profile page vulnerable to Cross Site Scripting (XSS) in flaskBlog
Details

flaskBlog is a simple blog app built with Flask. Improper storage and rendering of the /user/<user> page allows a user's comments to execute arbitrary javascript code. The html template user.html contains the following code snippet to render comments made by a user: <div class="content" tag="content">{{comment[2]|safe}}</div>. Use of the "safe" tag causes flask to not escape the rendered content. To remediate this, simply remove the |safe tag from the HTML above. No fix is is available and users are advised to manually edit their installation.

Database specific
{
    "cwe_ids": [
        "CWE-79"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/22xxx/CVE-2024-22414.json",
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/dogukanurker/flaskblog

Affected ranges

Type
GIT
Repo
https://github.com/dogukanurker/flaskblog
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

1.*

1.0.0
1.0.1
1.0.2
1.0.3
1.0.4
1.0.5
1.0.6
1.0.7
1.0.8
1.0.9
1.1.0