Vulnerability Description
Meldekarten generator is an open source project to create a program, running locally in the browser without the need for an internet-connection, to create, store and print registration cards for volunteers. All text fields on the webpage are vulnerable to XSS attacks. The user input isn't (fully) sanitized after submission. This issue has been addressed in commit `77e04f4af` which is included in the `1.0.0b1.1.2` release. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Meldekarten Generator Project | Meldekarten Generator | < 1.0.0b1.1.2 |
Related Weaknesses (CWE)
References
- https://github.com/jucktnich/meldekarten-generator/commit/77e04f4af85a6d0b08e616Patch
- https://github.com/jucktnich/meldekarten-generator/security/advisories/GHSA-f2gpExploit
- https://github.com/jucktnich/meldekarten-generator/commit/77e04f4af85a6d0b08e616Patch
- https://github.com/jucktnich/meldekarten-generator/security/advisories/GHSA-f2gpExploit
FAQ
What is CVE-2023-36463?
CVE-2023-36463 is a vulnerability with a CVSS score of 5.3 (MEDIUM). Meldekarten generator is an open source project to create a program, running locally in the browser without the need for an internet-connection, to create, store and print registration cards for volun...
How severe is CVE-2023-36463?
CVE-2023-36463 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-36463?
Check the references section above for vendor advisories and patch information. Affected products include: Meldekarten Generator Project Meldekarten Generator.