{"id":"CVE-2020-25288","details":"An issue was discovered in MantisBT before 2.24.3. When editing an Issue in a Project where a Custom Field with a crafted Regular Expression property is used, improper escaping of the corresponding form input's pattern attribute allows HTML injection and, if CSP settings permit, execution of arbitrary JavaScript.","aliases":["GHSA-qgrr-f26j-87vf"],"modified":"2026-04-10T04:18:58.112593Z","published":"2020-09-30T21:15:13.167Z","references":[{"type":"FIX","url":"https://mantisbt.org/bugs/view.php?id=27275"},{"type":"FIX","url":"http://github.com/mantisbt/mantisbt/commit/221cf323f16a9738a5b27aaba94758f11281d85c"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mantisbt/mantisbt","events":[{"introduced":"0"},{"fixed":"3a225b30482fa7d3b93935f466abce8947dded74"},{"fixed":"221cf323f16a9738a5b27aaba94758f11281d85c"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"2.24.3"}]}}],"versions":["release-1.2.0a1","release-1.2.0a2","release-1.2.0a3","release-1.2.0rc1","release-1.3.0-beta.1","release-1.3.0-beta.2","release-1.3.0-beta.3","release-1.3.0-rc.1","release-1.3.0-rc.2","release-2.0.0","release-2.0.0-beta.1","release-2.0.0-beta.2","release-2.0.0-beta.3","release-2.0.0-rc.1","release-2.0.0-rc.2","release-2.1.0","release-2.10.0","release-2.11.0","release-2.12.0","release-2.13.0","release-2.14.0","release-2.15.0","release-2.16.0","release-2.17.0","release-2.18.0","release-2.19.0","release-2.2.0","release-2.20.0","release-2.21.0","release-2.22.0","release-2.23.0","release-2.24.0","release-2.24.1","release-2.24.2","release-2.3.0","release-2.4.0","release-2.5.0","release-2.6.0","release-2.7.0","release-2.8.0","release-2.9.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-25288.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N"}]}