Description
Multiple cross-site scripting (XSS) vulnerabilities in apps/common/templates/calculate_form_title.html in Mayan EDMS 0.13 allow remote authenticated users to inject arbitrary web script or HTML via a (1) tag or the (2) title of a source in a Staging folder, (3) Name field in a bootstrap setup, or Title field in a (4) smart link or (5) web form.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Dolev Farhi · textwebappsmultiple
https://www.exploit-db.com/exploits/33493
References (8)
Core 8
Core References
Mailing List mailing-list
x_refsource_mlist
http://seclists.org/oss-sec/2014/q2/352
Issue Tracking x_refsource_confirm
https://github.com/mayan-edms/mayan-edms/issues/3
Mailing List mailing-list
x_refsource_mlist
http://seclists.org/oss-sec/2014/q2/349
Exploit x_refsource_misc
http://research.openflare.org/advisories/OF-2014-09/mayan-edbs-storedxss.txt
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/33493
Various Sources x_refsource_misc
http://research.openflare.org/poc/maya-edms/maya-edms_multiple_xss.avi
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/67552
Exploit, Patch x_refsource_confirm
https://github.com/mayan-edms/mayan-edms/commit/398c480c10416d76e7c1dcb607e726e8fc988e72
Scores
EPSS
0.0107
EPSS Percentile
77.9%
Details
CWE
CWE-79
Status
published
Products (2)
mayan-edms/mayan_edms
0.13
pypi/mayan-edms
0PyPI
Published
May 27, 2014
Tracked Since
Feb 18, 2026