{"id":"CVE-2021-43787","details":"Nodebb is an open source Node.js based forum software. In affected versions a prototype pollution vulnerability in the uploader module allowed a malicious user to inject arbitrary data (i.e. javascript) into the DOM, theoretically allowing for an account takeover when used in conjunction with a path traversal vulnerability disclosed at the same time as this report. The vulnerability has been patched as of v1.18.5. Users are advised to upgrade as soon as possible.","aliases":["GHSA-wx69-rvg3-x7fc"],"modified":"2026-02-22T08:28:48.248880Z","published":"2021-11-29T20:15:08.190Z","related":["GHSA-wx69-rvg3-x7fc"],"references":[{"type":"ADVISORY","url":"https://blog.sonarsource.com/nodebb-remote-code-execution-with-one-shot/"},{"type":"ADVISORY","url":"https://github.com/NodeBB/NodeBB/commit/1783f918bc19568f421473824461ff2ed7755e4c"},{"type":"ADVISORY","url":"https://github.com/NodeBB/NodeBB/releases/tag/v1.18.5"},{"type":"ADVISORY","url":"https://github.com/NodeBB/NodeBB/security/advisories/GHSA-wx69-rvg3-x7fc"},{"type":"FIX","url":"https://github.com/NodeBB/NodeBB/commit/1783f918bc19568f421473824461ff2ed7755e4c"},{"type":"FIX","url":"https://github.com/NodeBB/NodeBB/releases/tag/v1.18.5"},{"type":"FIX","url":"https://github.com/NodeBB/NodeBB/security/advisories/GHSA-wx69-rvg3-x7fc"},{"type":"EVIDENCE","url":"https://blog.sonarsource.com/nodebb-remote-code-execution-with-one-shot/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/nodebb/nodebb","events":[{"introduced":"0"},{"fixed":"1783f918bc19568f421473824461ff2ed7755e4c"}]}],"versions":["1.0.1-auto.0","v0.0.3","v0.0.4","v0.0.5","v0.0.6","v0.0.7","v0.1.0","v0.1.1","v0.2.0","v0.2.1","v0.3.0","v0.3.1","v0.3.2","v0.5.0-1","v0.5.0-2","v0.9.2","v1.0.0","v1.14.1-beta.0","v1.14.1-beta.1","v1.14.1-beta.2","v1.14.1-beta.3","v1.14.2-beta.0","v1.14.2-beta.1","v1.14.3-beta.0","v1.14.3-beta.1","v1.14.3-beta.10","v1.14.3-beta.11","v1.14.3-beta.12","v1.14.3-beta.13","v1.14.3-beta.14","v1.14.3-beta.15","v1.14.3-beta.16","v1.14.3-beta.2","v1.14.3-beta.3","v1.14.3-beta.4","v1.14.3-beta.5","v1.14.3-beta.6","v1.14.3-beta.7","v1.14.3-beta.8","v1.14.3-beta.9","v1.15.0","v1.15.0-beta.0","v1.15.0-beta.1","v1.15.0-beta.10","v1.15.0-beta.11","v1.15.0-beta.12","v1.15.0-beta.13","v1.15.0-beta.14","v1.15.0-beta.15","v1.15.0-beta.16","v1.15.0-beta.17","v1.15.0-beta.18","v1.15.0-beta.19","v1.15.0-beta.2","v1.15.0-beta.20","v1.15.0-beta.21","v1.15.0-beta.22","v1.15.0-beta.23","v1.15.0-beta.24","v1.15.0-beta.25","v1.15.0-beta.26","v1.15.0-beta.27","v1.15.0-beta.28","v1.15.0-beta.29","v1.15.0-beta.3","v1.15.0-beta.30","v1.15.0-beta.4","v1.15.0-beta.5","v1.15.0-beta.6","v1.15.0-beta.7","v1.15.0-beta.8","v1.15.0-beta.9","v1.15.0-rc.0","v1.15.0-rc.1","v1.15.0-rc.2","v1.15.0-rc.3","v1.15.0-rc.4","v1.15.0-rc.5","v1.15.1","v1.15.1-beta.0","v1.15.2-beta.0","v1.15.2-beta.1","v1.15.3-beta.0","v1.16.1-beta.0","v1.16.2-beta.0","v1.17.0-beta.0","v1.17.0-beta.1","v1.17.0-beta.2","v1.17.0-beta.3","v1.17.0-beta.4","v1.17.0-beta.5","v1.5.3"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-43787.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}