Insufficient Input Escaping in Nextcloud Dialogs Library Leads to XSS Vulnerability

Insufficient Input Escaping in Nextcloud Dialogs Library Leads to XSS Vulnerability

CVE-2021-29438 · MEDIUM Severity

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

The Nextcloud dialogs library (npm package @nextcloud/dialogs) before 3.1.2 insufficiently escaped text input passed to a toast. If your application displays toasts with user-supplied input, this could lead to a XSS vulnerability. The vulnerability has been patched in version 3.1.2 If you need to display HTML in the toast, explicitly pass the `options.isHTML` config flag.

Learn more about our Cloud Audit.