{"id":"CVE-2021-37860","details":"Mattermost 5.38 and earlier fails to sufficiently sanitize clipboard contents, which allows a user-assisted attacker to inject arbitrary web script in product deployments that explicitly disable the default CSP.","aliases":["GHSA-hv5f-73mr-7vvj","GO-2022-0604"],"modified":"2026-04-10T04:36:09.555557Z","published":"2021-09-22T17:15:11.647Z","references":[{"type":"ADVISORY","url":"https://mattermost.com/security-updates/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mattermost/mattermost-server","events":[{"introduced":"0"},{"last_affected":"eef3b3d66a8da6487e7d7f66b2dbb7d045219a7c"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"5.38"}]}}],"versions":["cloud-2020-11-24","cloud-2020-12-08","cloud-2020-12-18","cloud-2021-01-12","cloud-2021-01-26","cloud-2021-02-10","cloud-2021-02-24","cloud-2021-02-25-1","cloud-2021-03-12-1","cloud-2021-03-23-1","cloud-2021-04-22-1","cloud-2021-05-05-1","cloud-2021-05-21-1","cloud-2021-06-02-1","cloud-2021-06-16-1","cloud-2021-07-01-1","cloud-2021-07-15-1","cloud-2021-07-29-1","v0.5.0","v4.10.0-rc1","v4.2.0-rc1","v4.3.0-rc1","v4.4.0-rc1","v4.5.0-rc1","v4.6.0-rc1","v4.6.0-rc2","v4.7.0-rc1","v4.8.0-rc1","v4.9.0-rc1","v5.0.0-rc1","v5.1.0-rc1","v5.2.0-rc1","v5.2.0-rc2","v5.38.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-37860.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}