I contacted the monica development team via email on 11/20/2024. I also contacted them via LinkedIn, and other platforms in the weeks that followed. Publishing here since there was no response.# Monica-Stored-XSS-Vulnerability
## CVE-2024-54951
I contacted the monica development team via email on 11/20/2024. I also contacted them via LinkedIn through connection message attempt, and other platforms in the weeks that followed. Publishing here since there was no response after 3 months of time.
## Monica Docker v. 4.1.2 Stored XSS Vulnerability
1) First hit the contacts button in the top pane

2) On the right hand side click [Add someone]

3) enter your XSS payload into all of the name fields as they are all vulnerable. You need to use double quotes for your payloads single quotes seem to break the web application.

4) then on the left hand pane click the HOW YOU MET url.

5) Then select the contact that has your javascript payloads under the "Has someone introduced you to this person?" drop down list. Then hit save.

6) See the javascript payload in the contact page for the person you made executed under the "HOW YOU MET" box.


[4.0K] /data/pocs/e29e5a2cd37983714ac5ad3bc0f0a468b6b60b5d
└── [1.5K] README.md
0 directories, 1 file