logo

CVE-2024-33670 passbolt/passbolt_api

Package

Manager: composer
Name: passbolt/passbolt_api
Vulnerable Version: >=0 <4.6.2

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00338 pctl0.55959

Details

Passbolt API allows HTML injection Passbolt API before 4.6.2 allows HTML injection in a URL parameter, resulting in custom content being displayed when a user visits the crafted URL. Although the injected content is not executed as JavaScript due to Content Security Policy (CSP) restrictions, it may still impact the appearance and user interaction of the page.

Metadata

Created: 2024-04-26T03:30:29Z
Modified: 2024-04-26T16:42:41Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/04/GHSA-2pg6-vw9c-qhjv/GHSA-2pg6-vw9c-qhjv.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-2pg6-vw9c-qhjv
Finding: F008
Auto approve: 1