First published: Tue Jun 14 2022(Updated: )
Discourse Calendar is a calendar plugin for Discourse, an open-source messaging app. Prior to version 1.0.1, parsing and rendering of Event names can be susceptible to cross-site scripting (XSS) attacks. This vulnerability only affects sites which have modified or disabled Discourse’s default Content Security Policy. This issue is patched in version 1.0.1 of the Discourse Calendar plugin. As a workaround, ensure that the Content Security Policy is enabled, and has not been modified in a way which would make it more vulnerable to XSS attacks.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse Discourse Calendar | <1.0.1 |
https://github.com/discourse/discourse-calendar/commit/2719b9e81994e961bf8c4e12b4556dc9777dd62f
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Discourse Calendar vulnerability is CVE-2022-31059.
The severity level of CVE-2022-31059 is medium (5.4).
CVE-2022-31059 impacts Discourse Calendar by making the parsing and rendering of event names susceptible to cross-site scripting (XSS) attacks.
Versions prior to 1.0.1 of Discourse Calendar are affected by CVE-2022-31059.
To fix CVE-2022-31059 in Discourse Calendar, it is recommended to update to version 1.0.1 or later of the plugin.