CVE-2023-32693

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-32693
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-32693.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-32693
Aliases
Withdrawn
2024-05-08T06:52:10.248030Z
Published
2023-07-11T18:15:14Z
Modified
2023-11-28T23:40:48.798959Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

Decidim is a participatory democracy framework, written in Ruby on Rails, originally developed for the Barcelona City government online and offline participation website. The external link feature is susceptible to cross-site scripting. This allows a remote attacker to execute JavaScript code in the context of a currently logged-in user. An attacker could use this vulnerability to make other users endorse or support proposals they have no intention of supporting or endorsing. The problem was patched in versions 0.27.3 and 0.26.7.

References

Affected packages

Git / github.com/decidim/decidim

Affected ranges

Type
GIT
Repo
https://github.com/decidim/decidim
Events

Affected versions

v0.*

v0.27.0
v0.27.1
v0.27.2