{"id":"CVE-2021-47698","details":"Nagios XI versions prior to 5.8.7 using embedded Nagios Core are vulnerable to cross-site scripting (XSS) via the Core UI’s Views URL handling (escape_string()). Insufficient validation or escaping of user-supplied input may allow an attacker to inject and execute arbitrary script in the context of a victim's browser.","modified":"2026-04-10T04:41:03.818856Z","published":"2025-11-03T22:15:53.100Z","references":[{"type":"ADVISORY","url":"https://www.nagios.com/changelog/nagios-xi/"},{"type":"ADVISORY","url":"https://www.vulncheck.com/advisories/nagios-xi-xss-in-core-ui-views-url-handling"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47698.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"5.8.7"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"}]}