Loading HuntDB...

GHSA-529p-jj47-w3m3

GitHub Security Advisory

Decidim cross-site scripting (XSS) in the admin panel

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

### Impact

The admin panel is subject to potential XSS attach in case the attacker manages to modify some records being uploaded to the server.

The attacker is able to change e.g. to `<svg onload=alert('XSS')>` if they know how to craft these requests themselves. And then enter the returned blob ID to the form inputs manually by modifying the edit page source.

### Patches

Available in versions 0.27.6 and 0.28.1.

### Workarounds

Review the user accounts that have access to the admin panel (i.e. general Administrators, and participatory space's Administrators) and remove access to them if they don't need it.

### References

OWASP ASVS v4.0.3-5.1.3

Affected Packages

RubyGems decidim-admin
Affected versions: 0 (fixed in 0.27.6)
RubyGems decidim-admin
Affected versions: 0.28.0.rc1 (fixed in 0.28.1)

Related CVEs

Key Information

GHSA ID
GHSA-529p-jj47-w3m3
Published
July 10, 2024 4:02 PM
Last Modified
July 11, 2024 9:36 PM
CVSS Score
5.0 /10
Primary Ecosystem
RubyGems
Primary Package
decidim-admin
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 13, 2025 6:28 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.