{"id":"CVE-2023-46998","details":"Cross Site Scripting vulnerability in BootBox Bootbox.js v.3.2 through 6.0 allows a remote attacker to execute arbitrary code via a crafted payload to alert(), confirm(), prompt() functions.","aliases":["GHSA-m4ch-4m5f-2gp6"],"modified":"2026-04-10T05:05:02.474251Z","published":"2023-11-07T05:15:13.657Z","references":[{"type":"REPORT","url":"https://github.com/bootboxjs/bootbox/issues/661"},{"type":"EVIDENCE","url":"https://github.com/soy-oreocato/CVE-2023-46998/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/bootboxjs/bootbox","events":[{"introduced":"5079259d57dfedddd4b662d0a366a6339f8e5b3d"},{"last_affected":"07396f50aba60e34142692078e11a80c40ff5cf9"}],"database_specific":{"versions":[{"introduced":"3.2.0"},{"last_affected":"6.0.0"}]}}],"versions":["v3.2.0","v3.3.0","v4.0.0","v4.2.0","v4.3.0","v4.4.0","v5.0.0","v5.0.1","v5.1.0","v5.1.1","v5.1.3","v5.2.0","v5.3.2","v5.3.3","v5.3.4","v5.4.0","v5.4.1","v5.5.1","v5.5.2","v5.5.3","v6.0.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-46998.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}