Description
Tracks, a Getting Things Done (GTD) web application, is vulnerable to reflected cross-site scripting in versions prior to 2.7.1. Reflected cross-site scripting enables execution of malicious JavaScript in the context of a user’s browser if that user clicks on a malicious link, allowing phishing attacks that could lead to credential theft. Tracks version 2.7.1 is patched. No known complete workarounds are available.
References (4)
Core 4
Core References
Vendor Advisory x_refsource_confirm
https://github.com/TracksApp/tracks/security/advisories/GHSA-fp4p-59hr-3695
Patch x_refsource_misc
https://github.com/TracksApp/tracks/commit/b0d288d2efd0f8020d04ca95b8e0738a9eab6c51
Patch x_refsource_misc
https://github.com/TracksApp/tracks/commit/c23ca0574ec1149993476632ffd66643aec6aac2
Release Notes x_refsource_misc
https://github.com/TracksApp/tracks/releases/tag/v2.7.1
Scores
CVSS v3
6.1
EPSS
0.0052
EPSS Percentile
66.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-79
Status
published
Products (1)
TracksApp/tracks
< 2.7.1
Published
Jul 26, 2024
Tracked Since
Feb 18, 2026