### [CVE-2021-36092](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36092) ![](https://img.shields.io/static/v1?label=Product&message=((OTRS))%20Community%20Edition&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=OTRS&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=6.0.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.0.x%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=8.0.x%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-site%20Scripting%20(XSS)&color=brightgreen) ### Description It's possible to create an email which contains specially crafted link and it can be used to perform XSS attack. This issue affects: OTRS AG ((OTRS)) Community Edition:6.0.x version 6.0.1 and later versions. OTRS AG OTRS: 7.0.x version 7.0.27 and prior versions; 8.0.x version 8.0.14 and prior versions. ### POC #### Reference - https://otrs.com/release-notes/otrs-security-advisory-2021-15/ #### Github No PoCs found on GitHub currently.