First published: Tue Nov 16 2021(Updated: )
In Factor (App Framework & Headless CMS) forum plugin, versions v1.3.8 to v1.8.30, are vulnerable to reflected Cross-Site Scripting (XSS) at the “tags” and “category” parameters in the URL. An unauthenticated attacker can execute malicious JavaScript code and steal the session cookies.
Credit: vulnerabilitylab@mend.io
Affected Software | Affected Version | How to fix |
---|---|---|
Darwin Factor | >=1.3.8<=1.8.30 |
https://github.com/FactorJS/factor/blob/v1.8.30/@plugins/plugin-forum/topic-list.vue#L141-L143
No fix is provided
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-25983.
The affected software versions range from v1.3.8 to v1.8.30.
The severity of CVE-2021-25983 is medium with a CVSS score of 6.1.
An unauthenticated attacker can exploit CVE-2021-25983 by executing malicious JavaScript code via the "tags" and "category" parameters in the URL to perform reflected Cross-Site Scripting (XSS) attacks.
To fix the vulnerability, it is recommended to upgrade the Factor forum plugin to a version beyond v1.8.30.