Impact
The vulnerability occurs in DooTask v1.6.27, where the project description field on the /manage/project/<id> page accepts unsanitized input. This allows cross‑site scripting, enabling arbitrary JavaScript code to run in the browser of any user who views the affected project.
Affected Systems
Installations that run DooTask v1.6.27 are affected. No vendor information beyond the product is provided in the CNA data, and no other version details are listed.
Risk and Exploitability
The CVSS score of 6.1 indicates a moderate severity vulnerability. EPSS is less than 1%, suggesting a low probability of current exploitation. The vulnerability is not listed in the CISA KEV catalog, implying no publicly known widespread attacks. The likely attack vector is web‑based, involving an attacker inserting malicious content into the project description and convincing a user to view the page, in which case arbitrary scripts would execute in the viewer’s browser.
OpenCVE Enrichment