First published: Wed Sep 30 2020(Updated: )
An issue was discovered in MantisBT before 2.24.3. Improper escaping of a custom field's name allows an attacker to inject HTML and, if CSP settings permit, achieve execution of arbitrary JavaScript when attempting to update said custom field via `bug_actiongroup_page.php`.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mantisbt Mantisbt | <2.24.3 | |
composer/mantisbt/mantisbt | <2.24.3 | 2.24.3 |
<2.24.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25830 is a vulnerability in MantisBT before version 2.24.3 that allows an attacker to inject HTML and execute arbitrary JavaScript.
CVE-2020-25830 has a severity rating of medium.
CVE-2020-25830 works by improperly escaping a custom field's name, allowing an attacker to inject HTML and potentially execute arbitrary JavaScript code.
To fix CVE-2020-25830, you should upgrade to MantisBT version 2.24.3 or later.
You can find more information about CVE-2020-25830 in the following references: [GitHub commit](http://github.com/mantisbt/mantisbt/commit/8c6f4d8859785b67fb80ac65100ac5259ed9237d) and [MantisBT bug report](https://mantisbt.org/bugs/view.php?id=27304).