Firefly III before 4.7.17.1 is vulnerable to stored XSS due to lack of filtration of user-supplied data in a budget name. The JavaScript code is contained in a transaction, and is executed on the tags/show/$tag_number$ tag summary page. NOTE: It is asserted that an attacker must have the same access rights as the user in order to be able to execute the vulnerability
{
"nvd_published_at": "2019-07-18T03:15:00Z",
"github_reviewed_at": "2023-07-07T20:43:58Z",
"cwe_ids": [
"CWE-79"
],
"severity": "MODERATE",
"github_reviewed": true
}