A stored Cross-site scripting (XSS) issue in Text Editors and Formats in Backdrop CMS before 1.24.2 allows remote attackers to inject arbitrary web script or HTML via the name parameter. When a user is editing any content type (e.g., page, post, or card) as an admin, the stored XSS payload is executed upon selecting a malicious text formatting option. NOTE: the vendor disputes the security relevance of this finding because "any administrator that can configure a text format could easily allow Full HTML anywhere."
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-3862-c622-v4fp Cross-site Scripting in Backdrop CMS
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-02T14:45:25.556Z

Reserved: 2023-04-23T00:00:00

Link: CVE-2023-31045

cve-icon Vulnrichment

Updated: 2024-08-02T14:45:25.556Z

cve-icon NVD

Status : Modified

Published: 2023-04-24T08:15:07.257

Modified: 2024-11-21T08:01:18.720

Link: CVE-2023-31045

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses