{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T07:38:37.727","vulnerabilities":[{"cve":{"id":"CVE-2023-50924","sourceIdentifier":"security-advisories@github.com","published":"2023-12-22T21:15:08.370","lastModified":"2024-11-21T08:37:32.523","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Englesystem is a shift planning system for chaos events. Engelsystem prior to v3.4.1 performed insufficient validation of user supplied data for the DECT number, mobile number, and work-log comment fields. The values of those fields would be displayed in corresponding log overviews, allowing the injection and execution of Javascript code in another user's context. This vulnerability enables an authenticated user to inject Javascript into other user's sessions. The injected JS will be executed during normal usage of the system when viewing, e.g., overview pages. This issue has been fixed in version 3.4.1."},{"lang":"es","value":"Englesystem es un sistema de planificación de turnos para eventos de caos. Engelsystem anterior a v3.4.1 realizaba una validación insuficiente de los datos proporcionados por el usuario para los campos de DECT number, mobile number y work-log comment fields. Los valores de esos campos se mostrarían en las descripciones generales de registros correspondientes, lo que permitiría la inyección y ejecución de código Javascript en el contexto de otro usuario. Esta vulnerabilidad permite a un usuario autenticado inyectar Javascript en las sesiones de otros usuarios. El JS inyectado se ejecutará durante el uso normal del sistema al visualizar, por ejemplo, páginas de descripción general. Este problema se solucionó en la versión 3.4.1."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H","baseScore":7.3,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.3,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:engelsystem:engelsystem:*:*:*:*:*:*:*:*","versionEndExcluding":"3.4.1","matchCriteriaId":"7FFE9236-E9EA-4C61-908B-D8F668F22099"}]}]}],"references":[{"url":"https://github.com/engelsystem/engelsystem/commit/efda1ffc1ce59f02a7d237d9087adea26e73ec5f","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/engelsystem/engelsystem/security/advisories/GHSA-p5ch-rrpm-wvhm","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/engelsystem/engelsystem/commit/efda1ffc1ce59f02a7d237d9087adea26e73ec5f","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/engelsystem/engelsystem/security/advisories/GHSA-p5ch-rrpm-wvhm","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]}]}}]}