Embedded content references at tasks could be used to temporarily execute script code in the context of the users browser session. To exploit this an attacker would require temporary access to the users account, access to another account within the same context or an successful social engineering attack to make users import external content. Attackers could perform malicious API requests or extract information from the users account. Please deploy the provided updates and patch releases. Sanitization of user-generated content has been improved. No publicly available exploits are known.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-20708 Embedded content references at tasks could be used to temporarily execute script code in the context of the users browser session. To exploit this an attacker would require temporary access to the users account, access to another account within the same context or an successful social engineering attack to make users import external content. Attackers could perform malicious API requests or extract information from the users account. Please deploy the provided updates and patch releases. Sanitization of user-generated content has been improved. No publicly available exploits are known.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 04 Nov 2025 19:30:00 +0000

Type Values Removed Values Added
References

cve-icon MITRE

Status: PUBLISHED

Assigner: OX

Published:

Updated: 2025-11-04T18:23:43.280Z

Reserved: 2024-01-12T07:03:12.862Z

Link: CVE-2024-23189

cve-icon Vulnrichment

Updated: 2024-08-01T22:59:32.094Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-04-08T09:15:09.413

Modified: 2025-11-04T19:16:33.540

Link: CVE-2024-23189

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.