Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. bolt/bolt
  4. ›
  5. CVE-2020-4041

CVE-2020-4041: Cross-site Scripting

June 8, 2020 (updated July 3, 2020)

In Bolt CMS, the filename of uploaded files was vulnerable to stored XSS. It is not possible to inject javascript code in the file name when creating/uploading the file. But, once created/uploaded, it can be renamed to inject the payload in it. Additionally, the measures to prevent renaming the file to disallowed filename extensions could be circumvented.

References

  • nvd.nist.gov/vuln/detail/CVE-2020-4041

Code Behaviors & Features

Detect and mitigate CVE-2020-4041 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 3.7.1

Fixed versions

  • 3.7.1

Solution

Upgrade to version 3.7.1 or above.

Impact 6.1 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Source file

packagist/bolt/bolt/CVE-2020-4041.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:59 +0000.