Description
Englesystem is a shift planning system for chaos events. Engelsystem prior to v3.4.1 performed insufficient validation of user supplied data for the DECT number, mobile number, and work-log comment fields. The values of those fields would be displayed in corresponding log overviews, allowing the injection and execution of Javascript code in another user's context. This vulnerability enables an authenticated user to inject Javascript into other user's sessions. The injected JS will be executed during normal usage of the system when viewing, e.g., overview pages. This issue has been fixed in version 3.4.1.
References (2)
Core 2
Core References
Patch, Third Party Advisory x_refsource_confirm
https://github.com/engelsystem/engelsystem/security/advisories/GHSA-p5ch-rrpm-wvhm
Scores
CVSS v3
7.3
EPSS
0.0009
EPSS Percentile
25.2%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-79
Status
published
Products (1)
engelsystem/engelsystem
< 3.4.1
Published
Dec 22, 2023
Tracked Since
Feb 18, 2026