First published: Wed Jul 07 2021(Updated: )
Insufficient input sanitization in markdown in GitLab version 13.11 and up allows an attacker to exploit a stored cross-site scripting vulnerability via a specially-crafted markdown
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=13.11.3<13.11.6 | |
GitLab | >=13.12.0<13.12.6 | |
GitLab | >=14.0.0<14.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22225 has a medium severity rating due to its potential impact on user data through stored cross-site scripting.
To remediate CVE-2021-22225, upgrade GitLab to a version that is not affected, such as 13.11.6, 13.12.6, or 14.0.3 and later.
CVE-2021-22225 is a stored cross-site scripting (XSS) vulnerability caused by insufficient input sanitization in markdown processing.
GitLab versions 13.11.3 to 13.11.6, 13.12.0 to 13.12.6, and 14.0.0 to 14.0.2 are affected by CVE-2021-22225.
Yes, CVE-2021-22225 can be exploited remotely through crafted markdown submissions that lead to stored XSS attacks.