CVE-2024-53864

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-53864
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-53864.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-53864
Aliases
Published
2024-11-29T18:45:31.131Z
Modified
2025-12-05T07:33:55.415075Z
Severity
  • 5.3 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N CVSS Calculator
Summary
Cross-site Scripting in a field that is used in the Content name pattern in ibexa/admin-ui
Details

Ibexa Admin UI Bundle is all the necessary parts to run the Ibexa DXP Back Office interface. The Content name pattern is used to build Content names from one or more fields. An XSS vulnerability has been found in this mechanism. Content edit permission is required to exploit it. After the fix, any existing injected XSS will not run. This issue has been patched in version 4.6.14. All users are advised to upgrade. There are no known workarounds for this vulnerability.

Database specific
{
    "cwe_ids": [
        "CWE-79"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/53xxx/CVE-2024-53864.json",
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/ibexa/admin-ui

Affected ranges

Type
GIT
Repo
https://github.com/ibexa/admin-ui
Events

Database specific

source

"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-53864.json"