CVE-2024-27091

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-27091
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-27091.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-27091
Aliases
  • GHSA-rwcv-whm8-fmxm
Published
2024-03-27T13:01:49.004Z
Modified
2025-12-21T06:44:00.430392Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
GeoNode stored XSS to full account takeover
Details

GeoNode is a geospatial content management system, a platform for the management and publication of geospatial data. An issue exists within GEONODE where the current rich text editor is vulnerable to Stored XSS. The applications cookies are set securely, but it is possible to retrieve a victims CSRF token and issue a request to change another user's email address to perform a full account takeover. Due to the script element not impacting the CORS policy, requests will succeed. This vulnerability is fixed in 4.2.3.

Database specific
{
    "cwe_ids": [
        "CWE-79"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/27xxx/CVE-2024-27091.json",
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/geonode/geonode

Affected ranges

Type
GIT
Repo
https://github.com/geonode/geonode
Events

Database specific

source

"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-27091.json"