MantisBT XSS allows unsanitized input via admin/install.php
Moderate severity
GitHub Reviewed
Published
May 13, 2022
to the GitHub Advisory Database
•
Updated May 30, 2025
Package
Affected versions
<= 1.3.11
>= 2.0.0, < 2.5.2
Patched versions
1.3.12
2.5.2
Description
Published by the National Vulnerability Database
Aug 1, 2017
Published to the GitHub Advisory Database
May 13, 2022
Reviewed
May 30, 2025
Last updated
May 30, 2025
An XSS issue was discovered in admin/install.php in MantisBT before 1.3.12 and 2.x before 2.5.2. Some variables under user control in the MantisBT installation script are not properly sanitized before being output, allowing remote attackers to inject arbitrary JavaScript code, as demonstrated by the $f_database, $f_db_username, and $f_admin_username variables. This is mitigated by the fact that the admin/ folder should be deleted after installation, and also prevented by CSP.
References