The application fails to properly sanitize user-controlled input within the Methods Management functionality when creating or managing application methods/pages. Multiple input fields accept attacker-controlled JavaScript payloads that are stored server-side without sanitization or output encoding.
These stored values are later rendered directly into administrative interfaces and global navigation components without proper encoding, resulting in Stored DOM-Based Cross-Site Scripting (XSS).
Critically, because created methods are automatically rendered inside the system’s navigation/menu structure, the injected payload executes globally — meaning every page visited where the malicious method appears in the menu triggers the XSS payload automatically.
This significantly increases severity, as exploitation is not limited to a single view — it becomes a platform-wide persistent execution point.
The following fields accept unsanitized input and allow persistent JavaScript injection:
0.31.0.0Exploitability
AV:NAC:LPR:LUI:NScope
S:CImpact
C:HI:LA:L9.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L