GHSA-gvcw-x64m-pfcj

Suggest an improvement
Source
https://github.com/advisories/GHSA-gvcw-x64m-pfcj
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-gvcw-x64m-pfcj/GHSA-gvcw-x64m-pfcj.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-gvcw-x64m-pfcj
Aliases
Published
2022-05-14T02:00:29Z
Modified
2024-02-16T08:15:08.424440Z
Severity
  • 4.0 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
Wallabag cross-site scripting (XSS) vulnerability
Details

The Wallabag application 2.2.3 to 2.3.2 is affected by one cross-site scripting (XSS) vulnerability that is stored within the configuration page. This vulnerability enables the execution of a JavaScript payload each time an administrator visits the configuration page. The vulnerability can be exploited with authentication and used to target administrators and steal their sessions.

Database specific
{
    "nvd_published_at": "2018-09-21T16:29:00Z",
    "cwe_ids": [
        "CWE-79"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2024-01-10T23:40:14Z"
}
References

Affected packages

Packagist / wallabag/wallabag

Package

Name
wallabag/wallabag
Purl
pkg:composer/wallabag/wallabag

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.2.3
Fixed
2.3.3

Affected versions

2.*

2.2.3
2.3.0
2.3.1
2.3.2