Vulnerability Description
Misskey is a decentralized microblogging platform. In versions of Misskey prior to 12.51.0, malicious actors can use the web client built-in dialog to display a malicious string, leading to cross-site scripting (XSS). XSS could compromise the API request token. This issue has been fixed in version 12.51.0. There are no known workarounds aside from upgrading.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Misskey | Misskey | < 12.51.0 |
Related Weaknesses (CWE)
References
- https://github.com/misskey-dev/misskey/commit/ec203f7f795766f76b55fecc9248168c1cPatchThird Party Advisory
- https://github.com/misskey-dev/misskey/security/advisories/GHSA-pmmv-jwqh-f5wwPatchThird Party Advisory
- https://github.com/misskey-dev/misskey/commit/ec203f7f795766f76b55fecc9248168c1cPatchThird Party Advisory
- https://github.com/misskey-dev/misskey/security/advisories/GHSA-pmmv-jwqh-f5wwPatchThird Party Advisory
FAQ
What is CVE-2021-39169?
CVE-2021-39169 is a vulnerability with a CVSS score of 8.0 (HIGH). Misskey is a decentralized microblogging platform. In versions of Misskey prior to 12.51.0, malicious actors can use the web client built-in dialog to display a malicious string, leading to cross-site...
How severe is CVE-2021-39169?
CVE-2021-39169 has been rated HIGH with a CVSS base score of 8.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-39169?
Check the references section above for vendor advisories and patch information. Affected products include: Misskey Misskey.