Vulnerability Description
HTML Injection vulnerability in the 'manageApiKeys' component in Grocy <= 4.0.3 allows attackers to inject arbitrary HTML content without script execution. This occurs when user-supplied data is not appropriately sanitized, enabling the injection of HTML tags through parameter values. The attacker can then manipulate page content in the QR code detail popup, often coupled with social engineering tactics, exploiting both the trust of users and the application's lack of proper input handling.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Grocy Project | Grocy | 4.0.3 |
Related Weaknesses (CWE)
References
- https://github.com/grocy/grocyProduct
- https://grocy.infoProduct
- https://nitipoom-jar.github.io/CVE-2023-48199/ExploitThird Party Advisory
- https://nitipoom-jaroonchaipipat.github.io/security-research-portal/2023-48199
- https://github.com/grocy/grocyProduct
- https://grocy.infoProduct
- https://nitipoom-jar.github.io/CVE-2023-48199/ExploitThird Party Advisory
FAQ
What is CVE-2023-48199?
CVE-2023-48199 is a vulnerability with a CVSS score of 7.8 (HIGH). HTML Injection vulnerability in the 'manageApiKeys' component in Grocy <= 4.0.3 allows attackers to inject arbitrary HTML content without script execution. This occurs when user-supplied data is not a...
How severe is CVE-2023-48199?
CVE-2023-48199 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-48199?
Check the references section above for vendor advisories and patch information. Affected products include: Grocy Project Grocy.