Description
Nautobot is a Network Source of Truth and Network Automation Platform built as a web application atop the Django Python framework with a PostgreSQL or MySQL database. It was discovered that due to improper handling and escaping of user-provided query parameters, a maliciously crafted Nautobot URL could potentially be used to execute a Reflected Cross-Site Scripting (Reflected XSS) attack against users. All filterable object-list views in Nautobot are vulnerable. This issue has been fixed in Nautobot versions 1.6.20 and 2.2.3. There are no known workarounds for this vulnerability.
References (4)
Core 4
Core References
Third Party Advisory x_refsource_confirm
https://github.com/nautobot/nautobot/security/advisories/GHSA-jxgr-gcj5-cqqg
Patch x_refsource_misc
https://github.com/nautobot/nautobot/pull/5646
Patch x_refsource_misc
https://github.com/nautobot/nautobot/pull/5647
Scores
CVSS v3
7.5
EPSS
0.0020
EPSS Percentile
42.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:L
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-79
Status
published
Products (2)
networktocode/nautobot
1.5.0 - 1.6.20
pypi/nautobot
1.5.0 - 1.6.20PyPI
Published
May 01, 2024
Tracked Since
Feb 18, 2026