Tolgee is an open-source localization platform. Due to lack of validation field - Org Name, bad actor can send emails with HTML injected code to the victims. Registered users can inject HTML into unsanitized emails from the Tolgee instance to other users. This unsanitized HTML ends up in invitation emails which appear as legitimate org invitations. Bad actors may direct users to malicious website or execute javascript in the context of the users browser. This vulnerability has been addressed in version 3.29.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.
History

Thu, 26 Sep 2024 15:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2023-09-07T19:39:07.916Z

Updated: 2024-09-26T14:12:50.570Z

Reserved: 2023-08-28T16:56:43.365Z

Link: CVE-2023-41316

cve-icon Vulnrichment

Updated: 2024-08-02T18:54:05.181Z

cve-icon NVD

Status : Modified

Published: 2023-09-07T20:15:07.677

Modified: 2024-11-21T08:21:03.357

Link: CVE-2023-41316

cve-icon Redhat

No data.