{"id":"CVE-2024-2211","details":"Cross-Site Scripting stored vulnerability in Gophish affecting version 0.12.1. This vulnerability could allow an attacker to store a malicious JavaScript payload in the campaign menu and trigger the payload when the campaign is removed from the menu.","modified":"2026-03-14T12:27:17.844066Z","published":"2024-03-06T11:15:07.233Z","references":[{"type":"ADVISORY","url":"https://www.incibe.es/en/incibe-cert/notices/aviso/cross-site-scripting-vulnerability-gophish-admin-panel"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/gophish/gophish","events":[{"introduced":"0"},{"last_affected":"b1648f0759c6d57ac989157c55d8b47c40254fe6"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"0.12.1"}]}}],"versions":["0.7.1","v0.1","v0.1.1","v0.1.2","v0.10.0","v0.10.1","v0.11.0","v0.12.0","v0.12.1","v0.2.0","v0.3.0","v0.4.0","v0.5.0","v0.6.0","v0.7.0","v0.8.0","v0.9.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-2211.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}