6.1
CVSSv3

CVE-2020-25864

Published: 20/04/2021 Updated: 25/10/2022
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.1 | Impact Score: 2.7 | Exploitability Score: 2.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

HashiCorp Consul and Consul Enterprise up to version 1.9.4 key-value (KV) raw mode was vulnerable to cross-site scripting. Fixed in 1.9.5, 1.8.10 and 1.7.14.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

hashicorp consul

Vendor Advisories

Debian Bug report logs - #987351 CVE-2020-25864 Package: consul; Maintainer for consul is Debian Go Packaging Team <pkg-go-maintainers@listsaliothdebianorg>; Source for consul is src:consul (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Thu, 22 Apr 2021 08:45:02 UTC Severity: grave T ...
No description is available for this CVE ...
A vulnerability was identified in Consul and Consul Enterprise ("Consul") before version 195 where a specially crafted KV entry could be used to perform a cross-site scripting (XSS) attack when viewed in the raw mode ...