[demo.weblate.org] Stored Self-XSS via Editor Link in Profile
Low
W
Weblate
Submitted None
Actions:
Reported by
ysx
Vulnerability Details
Technical details and impact analysis
Hi,
Input validation and/or sanitisation is not currently applied to the "Editor Link" in the user's [Preferences](https://demo.weblate.org/accounts/profile/#preferences). Consequently, it is possible to store a JavaScript payload which is stored and executes in the Weblate instance context.
{F178717}
## Steps to reproduce
1. Visit the above Preferences page and identify the Editor Link field
2. Populate the field with: `blocked:confirm(document.domain)`
3. Visit a [translation page](https://demo.weblate.org/translate/hello/master/zh_CN/?checksum=6412684aaf018e8e) and select a Source String Location
4. The XSS will trigger upon clicking on a Source String (e.g. `main.c`)
{F178716}
Please let me know if you require any additional information regarding this issue.
Thanks!
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Cross-site Scripting (XSS) - Stored