logo

CVE-2024-32469 decidim

Package

Manager: gem
Name: decidim
Vulnerable Version: >=0 <0.27.6 || >=0.28.0.rc1 <0.28.1

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N

EPSS: 0.00357 pctl0.57225

Details

Decidim cross-site scripting (XSS) in the pagination ### Impact The pagination feature used in searches and filters is subject to potential XSS attack through a malformed URL using the GET parameter `per_page`. ### Patches Not available ### Workarounds Not available ### References OWASP ASVS v4.0.3-5.1.3 ### Credits This issue was discovered in a security audit organized by the [mitgestalten Partizipationsbüro](https://partizipationsbuero.at/) and funded by [netidee](https://www.netidee.at/) against Decidim done during April 2024. The security audit was implemented by [AIT Austrian Institute of Technology GmbH](https://www.ait.ac.at/),

Metadata

Created: 2024-07-10T15:43:39Z
Modified: 2024-11-18T16:26:50Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/07/GHSA-7cx8-44pc-xv3q/GHSA-7cx8-44pc-xv3q.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-7cx8-44pc-xv3q
Finding: F008
Auto approve: 1