Advisory Database
  • Advisories
  • Dependency Scanning
  1. gem
  2. ›
  3. decidim
  4. ›
  5. CVE-2024-39910

CVE-2024-39910: Decidim::Admin vulnerable to cross-site scripting (XSS) in the admin panel with QuillJS WYSWYG editor

September 16, 2024 (updated September 17, 2024)

The WYSWYG editor QuillJS is subject to potential XSS attach in case the attacker manages to modify the HTML before being uploaded to the server.

The attacker is able to change e.g. to <svg onload=alert(‘XSS’)> if they know how to craft these requests themselves.

References

  • github.com/advisories/GHSA-vvqw-fqwx-mqmm
  • github.com/decidim/decidim
  • github.com/decidim/decidim/commit/47adca81cabea898005ec07b130b008f2a2be99f
  • github.com/decidim/decidim/security/advisories/GHSA-vvqw-fqwx-mqmm
  • github.com/rubysec/ruby-advisory-db/blob/master/gems/decidim/CVE-2024-39910.yml
  • nvd.nist.gov/vuln/detail/CVE-2024-39910

Code Behaviors & Features

Detect and mitigate CVE-2024-39910 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.27.7

Fixed versions

  • 0.27.7

Solution

Upgrade to version 0.27.7 or above.

Impact 5.4 MEDIUM

CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Source file

gem/decidim/CVE-2024-39910.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:37 +0000.