quickentity-editor-next is an open source, system local, video game asset editor. In affected versions HTML tags in entity names are not sanitised (XSS vulnerability). Allows arbitrary code execution within the browser sandbox, among other things, simply from loading a file containing a script tag in any entity name. This issue has been patched in version 1.28.1 of the application. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2023-03-06T18:12:47.593Z
Updated: 2024-08-02T12:09:43.602Z
Reserved: 2023-03-01T19:03:56.630Z
Link: CVE-2023-27472
Vulnrichment
No data.
NVD
Status : Modified
Published: 2023-03-06T19:15:10.483
Modified: 2024-11-21T07:52:58.480
Link: CVE-2023-27472
Redhat
No data.