Passbolt API before 4.6.2 allows HTML injection in a URL parameter, resulting in custom content being displayed when a user visits the crafted URL. Although the injected content is not executed as JavaScript due to Content Security Policy (CSP) restrictions, it may still impact the appearance and user interaction of the page.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-1067 | Passbolt API before 4.6.2 allows HTML injection in a URL parameter, resulting in custom content being displayed when a user visits the crafted URL. Although the injected content is not executed as JavaScript due to Content Security Policy (CSP) restrictions, it may still impact the appearance and user interaction of the page. |
Github GHSA |
GHSA-2pg6-vw9c-qhjv | Passbolt API allows HTML injection |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-02T02:36:04.533Z
Reserved: 2024-04-26T00:00:00
Link: CVE-2024-33670
Updated: 2024-04-26T17:37:30.178Z
Status : Analyzed
Published: 2024-04-26T01:15:46.573
Modified: 2025-06-18T19:16:31.087
Link: CVE-2024-33670
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA