Loading HuntDB...

[demo.weblate.org] Stored Self-XSS via Editor Link in Profile

Low
W
Weblate
Submitted None
Reported by ysx

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Stored
Hi, Input validation and/or sanitisation is not currently applied to the "Editor Link" in the user's [Preferences](https://demo.weblate.org/accounts/profile/#preferences). Consequently, it is possible to store a JavaScript payload which is stored and executes in the Weblate instance context. {F178717} ## Steps to reproduce 1. Visit the above Preferences page and identify the Editor Link field 2. Populate the field with: `blocked:confirm(document.domain)` 3. Visit a [translation page](https://demo.weblate.org/translate/hello/master/zh_CN/?checksum=6412684aaf018e8e) and select a Source String Location 4. The XSS will trigger upon clicking on a Source String (e.g. `main.c`) {F178716} Please let me know if you require any additional information regarding this issue. Thanks!

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - Stored