A stored Cross-site scripting (XSS) issue in Text Editors and Formats in Backdrop CMS before 1.24.2 allows remote attackers to inject arbitrary web script or HTML via the name parameter. When a user is editing any content type (e.g., page, post, or card) as an admin, the stored XSS payload is executed upon selecting a malicious text formatting option. NOTE: the vendor disputes the security relevance of this finding because "any administrator that can configure a text format could easily allow Full HTML anywhere."
References
Link | Resource |
---|---|
https://github.com/backdrop/backdrop-issues/issues/6065 | Exploit Issue Tracking Vendor Advisory |
https://github.com/backdrop/backdrop/releases/tag/1.24.2 | Release Notes |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2023-04-24T00:00:00
Updated: 2023-04-24T00:00:00
Reserved: 2023-04-23T00:00:00
Link: CVE-2023-31045
JSON object: View
NVD Information
Status : Modified
Published: 2023-04-24T08:15:07.257
Modified: 2024-05-17T02:23:47.157
Link: CVE-2023-31045
JSON object: View
Redhat Information
No data.
CWE