Description
Galette is a membership management web application geared towards non profit organizations. In versions prior to 0.9.5, malicious javascript code can be stored to be displayed later on self subscription page. The self subscription feature can be disabled as a workaround (this is the default state). Malicious javascript code can be executed (not stored) on login and retrieve password pages. This issue is patched in version 0.9.5.
References (5)
Core 5
Core References
Third Party Advisory x_refsource_confirm
https://github.com/galette/galette/security/advisories/GHSA-vjc9-mj44-x59q
Patch, Third Party Advisory x_refsource_misc
https://github.com/galette/galette/commit/514418da973ae5b84bf97f94bd288a41e8e3f0a6
Patch, Third Party Advisory x_refsource_misc
https://github.com/galette/galette/commit/8f3bdd9f7d0708466e011253064a867ca2b271a5
Patch, Third Party Advisory x_refsource_misc
https://github.com/galette/galette/commit/f54b2570615d38d0302e937079233e52c2d80995
Permissions Required, Vendor Advisory x_refsource_misc
https://bugs.galette.eu/issues/1535
Scores
CVSS v3
6.8
EPSS
0.0072
EPSS Percentile
72.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
Details
CWE
CWE-79
Status
published
Products (1)
galette/galette
< 0.9.5
Published
Oct 25, 2021
Tracked Since
Feb 18, 2026