First published: Fri Sep 21 2018(Updated: )
Stored XSS exists in views/fields/wysiwyg.js in EspoCRM 5.3.6 via a /#Email/view saved draft message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
EspoCRM | =5.3.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-17302 is a vulnerability in EspoCRM 5.3.6 that allows stored cross-site scripting (XSS) attacks through the /#Email/view saved draft message.
The stored XSS vulnerability in EspoCRM 5.3.6 is triggered when a user opens a saved draft message in the /#Email/view and the malicious script within the message gets executed.
CVE-2018-17302 has a severity rating of medium with a CVSS score of 5.4.
To fix the stored XSS vulnerability in EspoCRM 5.3.6, it is recommended to upgrade to a version that addresses the issue or apply the necessary patches provided by EspoCRM.
More information about CVE-2018-17302 can be found on the following references: [Link 1](https://github.com/espocrm/espocrm/issues/1039), [Link 2](https://github.com/security-breachlock/CVE-2018-17302/blob/master/XSS%20(Stored)%20in%20EspoCRM.pdf).