{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-11623","assignerOrgId":"4bb8329e-dd38-46c1-aafb-9bf32bcb93c6","state":"PUBLISHED","assignerShortName":"CERT-PL","dateReserved":"2024-11-22T15:12:36.191Z","datePublished":"2025-02-04T13:34:11.029Z","dateUpdated":"2025-02-12T17:10:12.746Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"authentik","repo":"https://github.com/goauthentik/authentik","vendor":"goauthentik","versions":[{"lessThan":"2024.10.4","status":"affected","version":"0","versionType":"custom"}]}],"credits":[{"lang":"en","type":"finder","value":"Daniel Basta (NASK-PIB)"}],"datePublic":"2025-02-04T11:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Authentik project is vulnerable to Stored XSS attacks through&nbsp;uploading crafted SVG files that are used as application icons.&nbsp;<br>This action could only be performed by an authenticated admin user.<br>The issue was fixed in&nbsp;2024.10.4 release."}],"value":"Authentik project is vulnerable to Stored XSS attacks through uploading crafted SVG files that are used as application icons. \nThis action could only be performed by an authenticated admin user.\nThe issue was fixed in 2024.10.4 release."}],"impacts":[{"capecId":"CAPEC-592","descriptions":[{"lang":"en","value":"CAPEC-592 Stored XSS"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":4.8,"baseSeverity":"MEDIUM","privilegesRequired":"HIGH","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"LOW","subIntegrityImpact":"LOW","userInteraction":"PASSIVE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N","version":"4.0","vulnAvailabilityImpact":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-79","description":"CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"4bb8329e-dd38-46c1-aafb-9bf32bcb93c6","shortName":"CERT-PL","dateUpdated":"2025-02-04T13:34:11.029Z"},"references":[{"tags":["vendor-advisory"],"url":"https://docs.goauthentik.io/docs/security/audits-and-certs/2024-11-cobalt#svg-images-for-icons-possible-xss-vulnerability"},{"tags":["patch"],"url":"https://github.com/goauthentik/authentik/pull/12092"},{"tags":["third-party-advisory"],"url":"https://cert.pl/en/posts/2025/02/CVE-2024-11623/"}],"source":{"discovery":"UNKNOWN"},"title":"Stored XSS in authentik","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-02-04T14:05:36.465208Z","id":"CVE-2024-11623","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-02-12T17:10:12.746Z"}}]}}