{"id":"CVE-2020-19709","details":"Insufficient filtering of the tag parameters in feehicms 0.1.3 allows attackers to execute arbitrary web or HTML via a crafted payload.","aliases":["GHSA-f8pv-x7h8-687v"],"modified":"2026-04-11T20:34:48.397599Z","published":"2021-08-26T03:15:08.620Z","references":[{"type":"REPORT","url":"https://github.com/liufee/feehicms/issues/2"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/liufee/cms","events":[{"introduced":"0"},{"last_affected":"bd768ad8e03e999c3f169f346321824726300fc0"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"0.1.3"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:feehi:feehicms:0.1.3:*:*:*:*:*:*:*"}}],"versions":["0.0.1","0.0.2","0.0.3","0.0.4","0.0.5","0.0.6","0.0.7","0.0.8","0.0.9","0.1.0","0.1.1","0.1.2","0.1.3"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-19709.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}