Vulnerability Description
pgAdmin <= 8.5 is affected by XSS vulnerability in /settings/store API response json payload. This vulnerability allows attackers to execute malicious script at the client end.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pgadmin | Pgadmin 4 | < 8.6 |
| Fedoraproject | Fedora | 40 |
Related Weaknesses (CWE)
References
- https://github.com/pgadmin-org/pgadmin4/issues/7282ExploitIssue TrackingVendor Advisory
- https://lists.fedoraproject.org/archives/list/[email protected]Mailing List
- https://github.com/pgadmin-org/pgadmin4/issues/7282ExploitIssue TrackingVendor Advisory
- https://lists.fedoraproject.org/archives/list/[email protected]Mailing List
FAQ
What is CVE-2024-4216?
CVE-2024-4216 is a vulnerability with a CVSS score of 7.4 (HIGH). pgAdmin <= 8.5 is affected by XSS vulnerability in /settings/store API response json payload. This vulnerability allows attackers to execute malicious script at the client end.
How severe is CVE-2024-4216?
CVE-2024-4216 has been rated HIGH with a CVSS base score of 7.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-4216?
Check the references section above for vendor advisories and patch information. Affected products include: Pgadmin Pgadmin 4, Fedoraproject Fedora.