Files
CVEs-PoC/2021/CVE-2021-25964.md
T
2024-06-18 02:51:15 +02:00

18 lines
832 B
Markdown

### [CVE-2021-25964](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25964)
![](https://img.shields.io/static/v1?label=Product&message=calibreweb&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3E%3D%200.6.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-site%20Scripting%20(XSS)&color=brighgreen)
### Description
In “Calibre-web” application, v0.6.0 to v0.6.12, are vulnerable to Stored XSS in “Metadata”. An attacker that has access to edit the metadata information, can inject JavaScript payload in the description field. When a victim tries to open the file, XSS will be triggered.
### POC
#### Reference
- https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25964
#### Github
No PoCs found on GitHub currently.