The Wallabag application 2.2.3 to 2.3.2 is affected by one cross-site scripting (XSS) vulnerability that is stored within the configuration page. This vulnerability enables the execution of a JavaScript payload each time an administrator visits the configuration page. The vulnerability can be exploited with authentication and used to target administrators and steal their sessions.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-4016 | The Wallabag application 2.2.3 to 2.3.2 is affected by one cross-site scripting (XSS) vulnerability that is stored within the configuration page. This vulnerability enables the execution of a JavaScript payload each time an administrator visits the configuration page. The vulnerability can be exploited with authentication and used to target administrators and steal their sessions. |
Github GHSA |
GHSA-gvcw-x64m-pfcj | Wallabag cross-site scripting (XSS) vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T08:10:13.320Z
Reserved: 2018-05-21T00:00:00.000Z
Link: CVE-2018-11352
No data.
Status : Modified
Published: 2018-09-21T16:29:00.297
Modified: 2024-11-21T03:43:11.937
Link: CVE-2018-11352
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA