{"id":"CVE-2023-28873","details":"An XSS issue in wiki and discussion pages in Seafile 9.0.6 allows attackers to inject JavaScript into the Markdown editor.","modified":"2026-04-10T04:57:02.430297Z","published":"2023-12-09T07:15:07.517Z","references":[{"type":"ADVISORY","url":"https://manual.seafile.com/changelog/server-changelog/#908-2022-09-07"},{"type":"EVIDENCE","url":"https://herolab.usd.de/en/security-advisories/usd-2022-0032/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/haiwen/seafile","events":[{"introduced":"0"},{"last_affected":"5517d012bde196a7bab99a08db6580d52630862a"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"9.0.6"}]}}],"versions":["1.0.0","1.2.0","1.2.1","mac-v1.6.2","server-2.0","v0.0.0","v1.3.0","v1.3.1","v1.3.5","v1.3.5-deb","v1.3.5-mac","v1.3.5-win","v1.4-mac","v1.4.1-server","v1.5.0-win","v1.5.1-server","v1.5.1-win","v1.5.2-win","v1.5.3-cli","v1.5.3-mac","v1.5.3-win","v1.6.0-deb","v1.6.0-server","v1.6.0-win","v1.7.0-deb","v1.7.0-server","v1.7.0-win","v1.7.1-mac","v1.7.1-win","v1.7.2-win","v1.8.0-mac","v2.0.2-server","v3.0.0","v3.0.0-server","v3.0.0-server-testing","v3.0.0-testing","v3.0.1-server","v3.0.1-server-testing","v3.0.2","v3.0.2-pro","v3.0.2-server","v3.0.2-server-testing","v3.0.2-testing","v3.0.3","v3.0.3-server","v3.0.3-testing","v3.0.4","v3.1.0-server-testing","v3.1.0-testing","v3.1.1-testing","v4.0.0","v4.0.0-server","v4.0.1","v4.0.1-server","v4.0.2","v4.0.2-server","v4.0.3","v4.0.3-server","v4.0.4","v4.0.4-server","v4.0.5","v4.0.6","v4.2.0","v4.2.0-server","v4.2.1","v4.2.1-server","v4.2.2","v4.2.4-bak","v4.2.5","v4.2.6","v4.3.0","v4.3.0-server","v4.3.1-server","v4.4.0","v4.4.0-server","v4.4.1","v4.4.1-server","v4.4.2","v4.4.2-server","v4.4.3-server","v5.0.0-server","v5.0.0-testing","v5.0.1-server","v5.0.2","v5.0.3","v5.0.4-server","v5.1.0","v5.1.0-server","v5.1.1","v5.1.1-server","v5.1.2","v5.1.2-server","v5.1.3","v5.1.4","v5.1.4-server","v5.1.4-testing","v6.0.0","v6.0.0-server","v6.0.1","v6.0.2","v6.0.2-testing","v6.0.3","v6.0.4","v6.0.6","v6.0.7","v6.1.0","v6.1.1","v6.1.3","v6.1.4","v6.1.5","v6.1.6","v6.1.7","v6.1.8","v6.2.0","v6.2.1","v6.2.10","v6.2.11","v6.2.2","v6.2.3","v6.2.4","v6.2.5","v6.2.7","v6.2.8","v6.2.9","v7.0.0","v7.0.1","v7.0.10","v7.0.2","v7.0.3","v7.0.3-bak","v7.0.4","v7.0.5","v7.0.6","v7.0.7","v7.0.8","v7.0.8-bak","v7.0.8-testing","v7.0.9","v8.0.0","v8.0.1","v8.0.10","v8.0.2","v8.0.3","v8.0.4","v8.0.5","v8.0.6","v8.0.7","v8.0.8","v8.0.9","v9.0.0","v9.0.1","v9.0.2","v9.0.2-1","v9.0.3","v9.0.4","v9.0.5","v9.0.6"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-28873.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"}]}