Description
EspoCRM 5.6.4 is vulnerable to stored XSS due to lack of filtration of user-supplied data in the Knowledge base. A malicious attacker can inject JavaScript code in the body parameter during api/v1/KnowledgeBaseArticle knowledge-base record creation.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-5566 | EspoCRM 5.6.4 is vulnerable to stored XSS due to lack of filtration of user-supplied data in the Knowledge base. A malicious attacker can inject JavaScript code in the body parameter during api/v1/KnowledgeBaseArticle knowledge-base record creation. |
References
| Link | Providers |
|---|---|
| https://github.com/espocrm/espocrm/issues/1356 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T00:12:43.400Z
Reserved: 2019-07-28T00:00:00.000Z
Link: CVE-2019-14350
No data.
Status : Modified
Published: 2019-07-28T16:15:10.807
Modified: 2024-11-21T04:26:33.870
Link: CVE-2019-14350
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD