In Apache ActiveMQ Artemis 2.5.0 to 2.13.0, a specially crafted MQTT packet which has an XSS payload as client-id or topic name can exploit this vulnerability. The XSS payload is being injected into the admin console's browser. The XSS payload is triggered in the diagram plugin; queue node and the info section.
{ "nvd_published_at": "2020-07-20T22:15:00Z", "github_reviewed_at": "2021-04-05T22:56:52Z", "severity": "MODERATE", "github_reviewed": true, "cwe_ids": [ "CWE-79" ] }