Impact
A stored cross‑site scripting flaw exists in ProjeQtor’s file upload functions, where the checkValidFileName() routine does not block .html or .htm files. Authenticated attackers can place scripts inside these files and upload them through image or attachment endpoints. Any user who later opens the file URL will have the embedded JavaScript run in their browser, potentially stealing data or hijacking session state.
Affected Systems
The vulnerability affects ProjeQtor versions 7.0 through 12.4.3. All installations running these releases are susceptible, regardless of operating system or deployment environment.
Risk and Exploitability
The CVSS score of 5.1 classifies this as moderately severe. Because the flaw requires authentication and file upload capability, the attack surface is limited to authenticated users. No public exploit code is known, and the vulnerability is not listed in the CISA KEV catalog; its EPSS score is currently unavailable.
OpenCVE Enrichment