Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Cross-site scripting (XSS) in the decidim admin panel with QuillJS WYSWYG editor
Vulnerability Description
decidim is a Free Open-Source participatory democracy, citizen participation and open government for cities and organizations. The WYSWYG editor QuillJS is subject to potential XSS attach in case the attacker manages to modify the HTML before being uploaded to the server. The attacker is able to change e.g. to <svg onload=alert('XSS')> if they know how to craft these requests themselves. This issue has been addressed in release version 0.27.7. All users are advised to upgrade. Users unable to upgrade should review the user accounts that have access to the admin panel (i.e. general Administrators, and participatory space's Administrators) and remove access to them if they don't need it. Disable the "Enable rich text editor for participants" setting in the admin dashboard
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N
Vulnerability Type
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
Vulnerability Title
Decidim 跨站脚本漏洞
Vulnerability Description
Decidim是Decidim开源的一个参与式民主框架,用 Ruby on Rails 编写。 Decidim 0.27.6版本及之前版本存在跨站脚本漏洞,该漏洞源于所使用的WYSIWYG编辑器QuillJS可能受到跨站脚本攻击。
CVSS Information
N/A
Vulnerability Type
N/A