{"id":"CVE-2020-25830","details":"An issue was discovered in MantisBT before 2.24.3. Improper escaping of a custom field's name allows an attacker to inject HTML and, if CSP settings permit, achieve execution of arbitrary JavaScript when attempting to update said custom field via bug_actiongroup_page.php.","aliases":["GHSA-2pm7-q8pc-xhvq"],"modified":"2026-04-10T04:25:17.305092Z","published":"2020-09-30T21:15:13.293Z","references":[{"type":"FIX","url":"http://github.com/mantisbt/mantisbt/commit/8c6f4d8859785b67fb80ac65100ac5259ed9237d"},{"type":"FIX","url":"https://mantisbt.org/bugs/view.php?id=27304"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mantisbt/mantisbt","events":[{"introduced":"0"},{"fixed":"3a225b30482fa7d3b93935f466abce8947dded74"},{"fixed":"8c6f4d8859785b67fb80ac65100ac5259ed9237d"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"2.24.3"}]}}],"versions":["release-1.2.0a1","release-1.2.0a2","release-1.2.0a3","release-1.2.0rc1","release-1.3.0-beta.1","release-1.3.0-beta.2","release-1.3.0-beta.3","release-1.3.0-rc.1","release-1.3.0-rc.2","release-2.0.0","release-2.0.0-beta.1","release-2.0.0-beta.2","release-2.0.0-beta.3","release-2.0.0-rc.1","release-2.0.0-rc.2","release-2.1.0","release-2.10.0","release-2.11.0","release-2.12.0","release-2.13.0","release-2.14.0","release-2.15.0","release-2.16.0","release-2.17.0","release-2.18.0","release-2.19.0","release-2.2.0","release-2.20.0","release-2.21.0","release-2.22.0","release-2.23.0","release-2.24.0","release-2.24.1","release-2.24.2","release-2.3.0","release-2.4.0","release-2.5.0","release-2.6.0","release-2.7.0","release-2.8.0","release-2.9.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-25830.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N"}]}