First published: Tue Apr 13 2021(Updated: )
The Nextcloud dialogs library (npm package @nextcloud/dialogs) before 3.1.2 insufficiently escaped text input passed to a toast. If your application displays toasts with user-supplied input, this could lead to a XSS vulnerability. The vulnerability has been patched in version 3.1.2 If you need to display HTML in the toast, explicitly pass the `options.isHTML` config flag.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud | <3.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-29438 is considered to be high due to the potential for XSS attacks.
To fix CVE-2021-29438, update the @nextcloud/dialogs package to version 3.1.2 or later.
CVE-2021-29438 can lead to cross-site scripting (XSS) vulnerabilities if user-supplied input is not properly escaped.
Your application may be affected by CVE-2021-29438 if it uses the @nextcloud/dialogs package version below 3.1.2 and displays user-supplied input in toasts.
CVE-2021-29438 is an XSS vulnerability caused by insufficiently escaping user input in toast notifications.