### [CVE-2021-22238](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22238) ![](https://img.shields.io/static/v1?label=Product&message=GitLab&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3E%3D14.0%2C%20%3C14.0.7%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3E%3D14.1%2C%20%3C14.1.2%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3E13.3%2C%20%3C13.12.9%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20('cross-site%20scripting')%20in%20GitLab&color=brightgreen) ### Description An issue has been discovered in GitLab affecting all versions starting with 13.3. GitLab was vulnerable to a stored XSS by using the design feature in issues. ### POC #### Reference - https://gitlab.com/gitlab-org/gitlab/-/issues/332420 #### Github No PoCs found on GitHub currently.