CWE
79
Advisory Published
Updated

CVE-2023-41703: XSS

First published: Mon Feb 12 2024(Updated: )

User ID references at mentions in document comments were not correctly sanitized. Script code could be injected to a users session when working with a malicious document. Please deploy the provided updates and patch releases. User-defined content like comments and mentions are now filtered to avoid potentially malicious content. No publicly available exploits are known.

Credit: security@open-xchange.com

Affected SoftwareAffected VersionHow to fix
Open-Xchange App Suite Backend<7.10.6
Open-Xchange App Suite Backend>7.10.6<8.20
Open-Xchange App Suite Backend=7.10.6
Open-Xchange App Suite Backend=7.10.6-patch_release_6069
Open-Xchange App Suite Backend=7.10.6-patch_release_6073
Open-Xchange App Suite Backend=7.10.6-patch_release_6080
Open-Xchange App Suite Backend=7.10.6-patch_release_6085
Open-Xchange App Suite Backend=7.10.6-patch_release_6093
Open-Xchange App Suite Backend=7.10.6-patch_release_6102
Open-Xchange App Suite Backend=7.10.6-patch_release_6112
Open-Xchange App Suite Backend=7.10.6-patch_release_6121
Open-Xchange App Suite Backend=7.10.6-patch_release_6133
Open-Xchange App Suite Backend=7.10.6-patch_release_6138
Open-Xchange App Suite Backend=7.10.6-patch_release_6141
Open-Xchange App Suite Backend=7.10.6-patch_release_6146
Open-Xchange App Suite Backend=7.10.6-patch_release_6147
Open-Xchange App Suite Backend=7.10.6-patch_release_6148
Open-Xchange App Suite Backend=7.10.6-patch_release_6150
Open-Xchange App Suite Backend=7.10.6-patch_release_6156
Open-Xchange App Suite Backend=7.10.6-patch_release_6161
Open-Xchange App Suite Backend=7.10.6-patch_release_6166
Open-Xchange App Suite Backend=7.10.6-patch_release_6173
Open-Xchange App Suite Backend=7.10.6-patch_release_6176
Open-Xchange App Suite Backend=7.10.6-patch_release_6178
Open-Xchange App Suite Backend=7.10.6-patch_release_6189
Open-Xchange App Suite Backend=7.10.6-patch_release_6194
Open-Xchange App Suite Backend=7.10.6-patch_release_6199
Open-Xchange App Suite Backend=7.10.6-patch_release_6204
Open-Xchange App Suite Backend=7.10.6-patch_release_6205
Open-Xchange App Suite Backend=7.10.6-patch_release_6209
Open-Xchange App Suite Backend=7.10.6-patch_release_6210
Open-Xchange App Suite Backend=7.10.6-patch_release_6214
Open-Xchange App Suite Backend=7.10.6-patch_release_6215
Open-Xchange App Suite Backend=7.10.6-patch_release_6216
Open-Xchange App Suite Backend=7.10.6-patch_release_6218
Open-Xchange App Suite Backend=7.10.6-patch_release_6219
Open-Xchange App Suite Backend=7.10.6-patch_release_6220
Open-Xchange App Suite Backend=7.10.6-patch_release_6227
Open-Xchange App Suite Backend=7.10.6-patch_release_6230
Open-Xchange App Suite Backend=7.10.6-patch_release_6233
Open-Xchange App Suite Backend=7.10.6-patch_release_6235
Open-Xchange App Suite Backend=7.10.6-patch_release_6236
Open-Xchange App Suite Backend=7.10.6-patch_release_6239
Open-Xchange App Suite Backend=7.10.6-patch_release_6241
Open-Xchange App Suite Backend=7.10.6-patch_release_6243
Open-Xchange App Suite Backend=7.10.6-patch_release_6245
Open-Xchange App Suite Backend=7.10.6-patch_release_6248
Open-Xchange App Suite Backend=7.10.6-patch_release_6249
Open-Xchange App Suite Backend=7.10.6-patch_release_6250
Open-Xchange App Suite Backend=7.10.6-patch_release_6251
Open-Xchange App Suite Backend=7.10.6-patch_release_6255

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2023-41703?

    CVE-2023-41703 has been rated as a high severity vulnerability due to its potential for script code injection into user sessions.

  • How do I fix CVE-2023-41703?

    To fix CVE-2023-41703, deploy the provided updates and patch releases from Open-Xchange to ensure user-defined content is properly sanitized.

  • What versions of Open-Xchange App Suite are affected by CVE-2023-41703?

    CVE-2023-41703 affects Open-Xchange App Suite versions prior to 7.10.6 and versions between 7.10.6 and 8.20.

  • What types of attacks does CVE-2023-41703 enable?

    CVE-2023-41703 enables potential cross-site scripting attacks by allowing script code injection through non-sanitized user mentions and comments.

  • What are the potential consequences of CVE-2023-41703?

    The consequences of CVE-2023-41703 include unauthorized access to user sessions, allowing attackers to execute arbitrary scripts.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203