6.1
CVSSv3

CVE-2021-39111

Published: 30/08/2021 Updated: 30/03/2022
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.1 | Impact Score: 2.7 | Exploitability Score: 2.8
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

The Editor plugin in Atlassian Jira Server and Data Center before version 8.5.18, from 8.6.0 prior to 8.13.10, and from version 8.14.0 prior to 8.18.2 allows remote malicious users to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in the handling of supplied content such as from a PDF when pasted into a field such as the description field.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

atlassian data center

atlassian jira data center

atlassian jira

atlassian jira server

Github Repositories

CVE-2021-39111 Exploit The Editor plugin in Atlassian Jira Server and Data Center before version 8518, from 860 before 81310, and from version 8140 before 8182 allows remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in the handling of supplied content such as from a PDF when pasted into a field such as the descript