Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-8631 | Publify is a self hosted Web publishing platform on Rails. Prior to version 10.0.1 of Publify, corresponding to versions prior to 10.0.2 of the `publify_core` rubygem, publisher on a `publify` application is able to perform a cross-site scripting (XSS) attack on an administrator using the redirect functionality. The exploitation of this XSS vulnerability requires the administrator to click a malicious link. An attack could attempt to hide their payload by using HTML, or other encodings, as to not make it obvious to an administrator that this is a malicious link. A publisher may attempt to use this vulnerability to escalate their privileges and become an administrator. Version 10.0.1 of Publify and version 10.0.2 of the `publify_core` rubygem fix the issue. |
Github GHSA |
GHSA-8fm5-gg2f-f66q | Publify Vulnerable To Cross-Site Scripting (XSS) Via Redirects Requiring User Interaction |
Mon, 14 Apr 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Publify
Publify publify Publify publify Core |
|
| CPEs | cpe:2.3:a:publify:publify:*:*:*:*:*:*:*:* cpe:2.3:a:publify:publify_core:*:*:*:*:*:ruby:*:* |
|
| Vendors & Products |
Publify
Publify publify Publify publify Core |
|
| Metrics |
cvssV3_1
|
Fri, 28 Mar 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 28 Mar 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Publify is a self hosted Web publishing platform on Rails. Prior to version 10.0.1 of Publify, corresponding to versions prior to 10.0.2 of the `publify_core` rubygem, publisher on a `publify` application is able to perform a cross-site scripting (XSS) attack on an administrator using the redirect functionality. The exploitation of this XSS vulnerability requires the administrator to click a malicious link. An attack could attempt to hide their payload by using HTML, or other encodings, as to not make it obvious to an administrator that this is a malicious link. A publisher may attempt to use this vulnerability to escalate their privileges and become an administrator. Version 10.0.1 of Publify and version 10.0.2 of the `publify_core` rubygem fix the issue. | |
| Title | Publify Vulnerable To Cross-Site Scripting (XSS) Via Redirects Requiring User Interaction | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-03-28T15:37:35.064Z
Reserved: 2024-06-21T18:15:22.260Z
Link: CVE-2024-39311
Updated: 2025-03-28T15:37:30.948Z
Status : Analyzed
Published: 2025-03-28T15:15:44.647
Modified: 2025-04-14T14:24:49.550
Link: CVE-2024-39311
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA