Decidim is a participatory democracy framework, written in Ruby on Rails, originally developed for the Barcelona City government online and offline participation website. The external link feature is susceptible to cross-site scripting. This allows a remote attacker to execute JavaScript code in the context of a currently logged-in user. An attacker could use this vulnerability to make other users endorse or support proposals they have no intention of supporting or endorsing. The problem was patched in versions 0.27.3 and 0.26.7..This CVE has a CVSS3.1 score of 8.1 and a Base Severity of HIGH.
Info | Details |
---|---|
CVE ID | CVE-2023-32693 |
CVE State | PUBLISHED |
BaseScore | 8.1 |
BaseSeverity | HIGH |
VectorString | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N |
Version | NA |
References for CVE-2023-32693 :
https://github.com/decidim/decidim/security/advisories/GHSA-469h-mqg8-535r
https://github.com/decidim/decidim/releases/tag/v0.26.7
https://github.com/decidim/decidim/releases/tag/v0.27.3
Metric Type | Metric Score |
---|---|
AttackVector(AV) | NETWORK |
AttackComplexity(AC) | LOW |
PrivilegesRequired(PR) | NONE |
UserInteraction(UI) | REQUIRED |
Scope(S) | UNCHANGED |
Confidentiality(C) | HIGH |
Availability(A) | NONE |
Integrity(I) | HIGH |