{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T02:29:20.613","vulnerabilities":[{"cve":{"id":"CVE-2021-21319","sourceIdentifier":"security-advisories@github.com","published":"2021-10-25T16:15:08.020","lastModified":"2024-11-21T05:48:00.793","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Galette is a membership management web application geared towards non profit organizations. In versions prior to 0.9.5, malicious javascript code can be stored to be displayed later on self subscription page. The self subscription feature can be disabled as a workaround (this is the default state). Malicious javascript code can be executed (not stored) on login and retrieve password pages. This issue is patched in version 0.9.5."},{"lang":"es","value":"Galette es una aplicación web de administración de socios orientada a organizaciones sin ánimo de lucro. En versiones anteriores a 0.9.5, es posible puede almacenar código javascript malicioso para mostrarlo posteriormente en la página de auto-suscripción. La función de auto-suscripción puede ser deshabilitada como una solución (este es el estado predeterminado). El código javascript malicioso puede ser ejecutado (no almacenado) en las páginas de inicio de sesión y recuperación de contraseña. Este problema es corregido en la versión 0.9.5"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":4.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:N/I:P/A:N","baseScore":3.5,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:galette:galette:*:*:*:*:*:*:*:*","versionEndExcluding":"0.9.5","matchCriteriaId":"4C2781EA-63BF-43EA-B2CD-E1A66E81D86E"}]}]}],"references":[{"url":"https://bugs.galette.eu/issues/1535","source":"security-advisories@github.com","tags":["Permissions Required","Vendor Advisory"]},{"url":"https://github.com/galette/galette/commit/514418da973ae5b84bf97f94bd288a41e8e3f0a6","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/galette/galette/commit/8f3bdd9f7d0708466e011253064a867ca2b271a5","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/galette/galette/commit/f54b2570615d38d0302e937079233e52c2d80995","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/galette/galette/security/advisories/GHSA-vjc9-mj44-x59q","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://bugs.galette.eu/issues/1535","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Permissions Required","Vendor Advisory"]},{"url":"https://github.com/galette/galette/commit/514418da973ae5b84bf97f94bd288a41e8e3f0a6","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/galette/galette/commit/8f3bdd9f7d0708466e011253064a867ca2b271a5","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/galette/galette/commit/f54b2570615d38d0302e937079233e52c2d80995","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/galette/galette/security/advisories/GHSA-vjc9-mj44-x59q","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}