A stored XSS vulnerability exists in the User Permissions page. The User Group name is rendered without proper HTML escaping in the permissions section, allowing an attacker to execute arbitrary JavaScript when another user views or edits a user's permissions.
[!NOTE] This is a separate vulnerability from the previously reported "Stored XSS via User Group Name in User Settings Page" and "Multiple Stored XSS in User Group Edit Page". This affects a different sink: the individual user's permissions page.
allowAdminChanges is enabled in production, which is against our security recommendations.<img src=x onerror="alert('XSS')" hidden>
/admin/users/{id})Sanitize user group names when rendering in the user permissions template.
https://github.com/craftcms/cms-ghsa-4mgv-366x-qxvx/pull/2
5.8.22Exploitability
AV:NAC:LAT:NPR:HUI:AVulnerable System
VC:NVI:LVA:NSubsequent System
SC:NSI:NSA:N1.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P