CVE-2024-47610

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-47610
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-47610.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-47610
Aliases
  • GHSA-wp3m-jhgv-rhqr
Published
2024-10-07T20:45:20.510Z
Modified
2025-12-01T12:37:08.907074Z
Severity
  • 7.3 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N CVSS Calculator
Summary
Stored Cross-site Scripting Vulnerability in Markdown Editor
Details

InvenTree is an Open Source Inventory Management System. In affected versions of InvenTree it is possible for a registered user to store javascript in markdown notes fields, which are then displayed to other logged in users who visit the same page and executed. The vulnerability has been addressed as follows: 1. HTML sanitization has been enabled in the front-end markdown rendering library - easymde. 2. Stored markdown is also validated on the backend, to ensure that malicious markdown is not stored in the database. These changes are available in release versions 0.16.5 and later. All users are advised to upgrade. There are no workarounds, an update is required to get the new validation functions.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/47xxx/CVE-2024-47610.json",
    "cwe_ids": [
        "CWE-79"
    ]
}
References

Affected packages

Git / github.com/inventree/inventree

Affected ranges

Type
GIT
Repo
https://github.com/inventree/inventree
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed