{"id":"CVE-2024-34081","summary":"MantisBT Cross-site Scripting vulnerability","details":"MantisBT (Mantis Bug Tracker) is an open source issue tracker.  Improper escaping of a custom field's name allows an attacker to inject HTML and, if CSP settings permit, achieve execution of arbitrary JavaScript when resolving or closing issues (`bug_change_status_page.php`) belonging to a project linking said custom field, viewing issues (`view_all_bug_page.php`) when the custom field is displayed as a column, or printing issues (`print_all_bug_page.php`) when the custom field is displayed as a column. Version 2.26.2 contains a patch for the issue. As a workaround, ensure Custom Field Names do not contain HTML tags.","aliases":["GHSA-wgx7-jp56-65mq"],"modified":"2026-04-09T10:10:28.204980Z","published":"2024-05-13T15:40:54.014Z","database_specific":{"cna_assigner":"GitHub_M","cwe_ids":["CWE-79"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/34xxx/CVE-2024-34081.json"},"references":[{"type":"WEB","url":"https://mantisbt.org/bugs/view.php?id=34432"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/34xxx/CVE-2024-34081.json"},{"type":"ADVISORY","url":"https://github.com/mantisbt/mantisbt/security/advisories/GHSA-wgx7-jp56-65mq"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-34081"},{"type":"FIX","url":"https://github.com/mantisbt/mantisbt/commit/447a521aae0f82f791b8116a14a20e276df739be"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mantisbt/mantisbt","events":[{"introduced":"0"},{"fixed":"4ab433bcd62ac80caded5be6f87c45942a988929"}]}],"versions":["release-1.2.0a1","release-1.2.0a2","release-1.2.0a3","release-1.2.0rc1","release-1.3.0-beta.1","release-1.3.0-beta.2","release-1.3.0-beta.3","release-1.3.0-rc.1","release-1.3.0-rc.2","release-2.0.0","release-2.0.0-beta.1","release-2.0.0-beta.2","release-2.0.0-beta.3","release-2.0.0-rc.1","release-2.0.0-rc.2","release-2.1.0","release-2.10.0","release-2.11.0","release-2.12.0","release-2.13.0","release-2.14.0","release-2.15.0","release-2.16.0","release-2.17.0","release-2.18.0","release-2.19.0","release-2.2.0","release-2.20.0","release-2.21.0","release-2.22.0","release-2.23.0","release-2.24.0","release-2.25.0","release-2.26.0","release-2.26.1","release-2.3.0","release-2.4.0","release-2.5.0","release-2.6.0","release-2.7.0","release-2.8.0","release-2.9.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-34081.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L"}]}