Firefly III before 4.7.17.3 is vulnerable to stored XSS due to lack of filtration of user-supplied data in image file content. The JavaScript code is executed during attachments/view/$file_id$ attachment viewing.
{
"github_reviewed": true,
"nvd_published_at": "2019-07-18T03:15:00Z",
"github_reviewed_at": "2023-07-05T23:46:03Z",
"severity": "MODERATE",
"cwe_ids": [
"CWE-79"
]
}