Instances relying on an allow-listed reset URL are vulnerable to an HTML injection attack through the use of query parameters in the reset URL.
The problem has been resolved and released under version 9.23.0. People relying on a custom password reset URL should upgrade to 9.23.0 or later, or remove the custom reset url from the configured allow list.
Disable the custom reset URL allow list.
{
"nvd_published_at": "2023-03-06T17:15:00Z",
"github_reviewed_at": "2023-03-07T20:35:54Z",
"cwe_ids": [
"CWE-79"
],
"github_reviewed": true,
"severity": "HIGH"
}