In “Calibre-web” application, v0.6.0 to v0.6.12, are vulnerable to Stored XSS in “Metadata”. An attacker that has access to edit the metadata information, can inject JavaScript payload in the description field. When a victim tries to open the file, XSS will be triggered.
References
Link | Resource |
---|---|
https://github.com/janeczku/calibre-web/commit/32e27712f0f71fdec646add20cd78b4ce75acfce | Patch Third Party Advisory |
https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25964 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-10-04 15:15
Updated : 2024-02-28 18:48
NVD link : CVE-2021-25964
Mitre link : CVE-2021-25964
CVE.ORG link : CVE-2021-25964
JSON object : View
Products Affected
calibre-web_project
- calibre-web
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')