You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Mar 23, 2025. It is now read-only.
hkalexling
published
GHSA-pg73-2855-jh9fApr 4, 2022
Package
No package listed
Affected versions
<= 0.26.0
Patched versions
0.26.1
Description
Impact
An attacker will be able to construct a URL on the user edit page (<your instance>/admin/user/edit) with query parameters containing JS scripts. The attacker can then trick the victim into opening the URL and thus potentially compromising the session ID.
Impact
An attacker will be able to construct a URL on the user edit page (
<your instance>/admin/user/edit
) with query parameters containing JS scripts. The attacker can then trick the victim into opening the URL and thus potentially compromising the session ID.Patches
The issue has been fixed in v0.26.1
Workarounds
References
PoC in #289, thanks to @bararchy