{"id":"CVE-2023-6571","summary":"Cross-site Scripting (XSS) - Reflected in kubeflow/kubeflow","details":"Cross-site Scripting (XSS) - Reflected in kubeflow/kubeflow","modified":"2026-05-01T04:21:44.234654Z","published":"2023-12-14T13:00:06.671Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/6xxx/CVE-2023-6571.json","cna_assigner":"@huntr_ai","cwe_ids":["CWE-79"]},"references":[{"type":"WEB","url":"https://huntr.com/bounties/f02781e7-2a53-4c66-aa32-babb16434632"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/6xxx/CVE-2023-6571.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6571"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/kubeflow/kubeflow","events":[{"introduced":"0"},{"last_affected":"cce5c88047815c45df8a52c8592e5890ae1b1949"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"1.7.0"}],"cpe":"cpe:2.3:a:kubeflow:kubeflow:1.7.0:*:*:*:*:*:*:*","source":"CPE_FIELD"}}],"versions":["4e7f4ed","v0","v0.1.0-rc.0","v0.1.1","v0.2.0-rc.0","v0.2.1","v0.2.1-rc.1","v0.4.0-rc.1","v0.6.0-rc.0","v0.6.start","v0.7.0-rc.0","v0.7.0-rc.1","v0.7.0-rc.2","v0.7.0-rc.3","v0.7.0-rc.4","v0.7.0-rc.5","v1.1.0","v1.2-rc.0","v1.5.0-rc.0","v1.7.0","v1.7.0-rc.0","v1.7.0-rc.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-6571.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"}]}