CVE-2023-32693
CVSS V2 None
CVSS V3 None
Description
Decidim is a participatory democracy framework, written in Ruby on Rails, originally developed for the Barcelona City government online and offline participation website. The external link feature is susceptible to cross-site scripting. This allows a remote attacker to execute JavaScript code in the context of a currently logged-in user. An attacker could use this vulnerability to make other users endorse or support proposals they have no intention of supporting or endorsing. The problem was patched in versions 0.27.3 and 0.26.7.
Overview
- CVE ID
- CVE-2023-32693
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2023-07-11T17:19:26.138Z
- Last Modified Date
- 2023-07-19T19:18:32.414Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/decidim/decidim/security/advisories/GHSA-469h-mqg8-535r | x_refsource_CONFIRM |
https://github.com/decidim/decidim/releases/tag/v0.26.7 | x_refsource_MISC |
https://github.com/decidim/decidim/releases/tag/v0.27.3 | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-32693 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32693 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-25 11:09:52 | Added to TrackCVE |