An issue was discovered in MantisBT before 2.24.3. When editing an Issue in a Project where a Custom Field with a crafted Regular Expression property is used, improper escaping of the corresponding form input's pattern attribute allows HTML injection and, if CSP settings permit, execution of arbitrary JavaScript.
{ "nvd_published_at": "2020-09-30T21:15:00Z", "github_reviewed_at": "2025-05-29T15:45:29Z", "github_reviewed": true, "severity": "MODERATE", "cwe_ids": [ "CWE-79" ] }