{"id":"CVE-2024-22414","summary":"User profile page vulnerable to Cross Site Scripting (XSS) in flaskBlog","details":"flaskBlog is a simple blog app built with Flask. Improper storage and rendering of the `/user/\u003cuser\u003e` page allows a user's comments to execute arbitrary javascript code. The html template `user.html` contains the following code snippet to render comments made by a user: `\u003cdiv class=\"content\" tag=\"content\"\u003e{{comment[2]|safe}}\u003c/div\u003e`. Use of the \"safe\" tag causes flask to _not_ escape the rendered content. To remediate this, simply remove the `|safe` tag from the HTML above. No fix is is available and users are advised to manually edit their installation.","aliases":["GHSA-mrcw-j96f-p6v6"],"modified":"2026-03-12T00:33:45.701038Z","published":"2024-01-17T20:25:29.629Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/22xxx/CVE-2024-22414.json","cwe_ids":["CWE-79"],"cna_assigner":"GitHub_M"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/22xxx/CVE-2024-22414.json"},{"type":"ADVISORY","url":"https://github.com/DogukanUrker/flaskBlog/security/advisories/GHSA-mrcw-j96f-p6v6"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-22414"},{"type":"WEB"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/dogukanurker/flaskblog","events":[{"introduced":"0"},{"last_affected":"571a251045877de6f537a259f1937f4a7ca873a4"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.1.0"}]}}],"versions":["1.0.0","1.0.1","1.0.2","1.0.3","1.0.4","1.0.5","1.0.6","1.0.7","1.0.8","1.0.9","1.1.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-22414.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L"}]}