Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/temporalio/ui-server/v2
  4. ›
  5. CVE-2024-2435

CVE-2024-2435: Temporal UI Server cross-site scripting vulnerability

April 2, 2024

For an attacker with pre-existing access to send a signal to a workflow, the attacker can make the signal name a script that executes when a victim views that signal. The XSS is in the timeline page displaying the workflow execution details of the workflow that was sent the crafted signal. Access to send a signal to a workflow is determined by how you configured the authorizer on your server. This includes any entity with permission to directly call SignalWorkflowExecution or SignalWithStartWorkflowExecution, or any entity can deploy a worker that has access to call workflow progress APIs (specifically RespondWorkflowTaskCompleted).

References

  • github.com/advisories/GHSA-8f25-w7qj-r7hc
  • github.com/temporalio/ui-server
  • github.com/temporalio/ui-server/releases/tag/v2.25.0
  • nvd.nist.gov/vuln/detail/CVE-2024-2435

Code Behaviors & Features

Detect and mitigate CVE-2024-2435 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2.25.0

Fixed versions

  • 2.25.0

Solution

Upgrade to version 2.25.0 or above.

Impact 4.3 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L

Learn more about CVSS

Weakness

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Source file

go/github.com/temporalio/ui-server/v2/CVE-2024-2435.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:52 +0000.