A stored code execution vulnerability in the user name field allows a low-privileged attacker to execute arbitrary code in the context of any user who passively visits a comment page, resulting in high confidentiality and integrity impact across security boundaries.
N/A
Not available
OWASP ASVS v4.0.3-5.1.3
This issue was discovered in a security audit organized by octree and made by Secu Labs against Decidim financed by the city of Lausanne (Switzerland).
0.30.50.31.1Exploitability
AV:NAC:LAT:NPR:LUI:PVulnerable System
VC:HVI:HVA:LSubsequent System
SC:HSI:HSA:L9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:L/SC:H/SI:H/SA:L