Details
-
Bug
-
Resolution: Duplicate
-
Major
-
None
-
11.10.10
-
None
-
Unknown
-
Description
1) Open user profile page and edit fields "first name", "last name", "company", "phone", "blog", "blog feed" with XSS payload, e.g.
first_name"><img src=x onerror=alert('first_name')>
2) Save changes, reload page
Actual result: XSS payload executes
Expected result: JS sanitized / escaped (like in "email" or "about" field)
Attachments
Issue Links
- duplicates
-
XWIKI-9658 XSS in the user profile
-
- Closed
-