Passbolt API before 4.6.2 allows HTML injection in a URL parameter, resulting in custom content being displayed when a user visits the crafted URL. Although the injected content is not executed as JavaScript due to Content Security Policy (CSP) restrictions, it may still impact the appearance and user interaction of the page.
References
Link | Resource |
---|---|
https://help.passbolt.com/incidents/reflective-html-injection-vulnerability | Issue Tracking Vendor Advisory |
https://www.passbolt.com/incidents | Issue Tracking Vendor Advisory |
https://www.passbolt.com/security/more | Product |
https://help.passbolt.com/incidents/reflective-html-injection-vulnerability | Issue Tracking Vendor Advisory |
https://www.passbolt.com/incidents | Issue Tracking Vendor Advisory |
https://www.passbolt.com/security/more | Product |
Configurations
History
18 Jun 2025, 19:16
Type | Values Removed | Values Added |
---|---|---|
First Time |
Passbolt
Passbolt passbolt Api |
|
References | () https://help.passbolt.com/incidents/reflective-html-injection-vulnerability - Issue Tracking, Vendor Advisory | |
References | () https://www.passbolt.com/incidents - Issue Tracking, Vendor Advisory | |
References | () https://www.passbolt.com/security/more - Product | |
CPE | cpe:2.3:a:passbolt:passbolt_api:*:*:*:*:*:*:*:* |
Information
Published : 2024-04-26 01:15
Updated : 2025-06-18 19:16
NVD link : CVE-2024-33670
Mitre link : CVE-2024-33670
CVE.ORG link : CVE-2024-33670
JSON object : View
Products Affected
passbolt
- passbolt_api
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')