First published: Tue May 06 2025(Updated: )
A flaw was found in the JBoss EAP Management Console, where a stored Cross-site scripting vulnerability occurs when an application improperly sanitizes user input before storing it in a data store. When this stored data is later included in web pages without adequate sanitization, malicious scripts can execute in the context of users who view these pages, leading to potential data theft, session hijacking, or other malicious activities. ### Impact Cross-site scripting (XSS) vulnerability in the management console. ### Patches Fixed in [HAL 3.7.11.Final](https://github.com/hal/console/releases/tag/v3.7.11) ### Workarounds No workaround available
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jboss.hal:hal-console | <3.7.11.Final | 3.7.11.Final |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
GHSA-f7jh-m6wp-jm7f is identified as a stored Cross-site Scripting (XSS) vulnerability that can lead to significant security risks.
To fix GHSA-f7jh-m6wp-jm7f, upgrade the JBoss EAP Management Console to version 3.7.11.Final or later.
GHSA-f7jh-m6wp-jm7f allows attackers to inject malicious scripts that can execute in a user's browser, potentially compromising user data.
GHSA-f7jh-m6wp-jm7f affects applications using the JBoss EAP Management Console version prior to 3.7.11.Final.
GHSA-f7jh-m6wp-jm7f was discovered due to inadequate sanitization of user input before being stored in the application.