{"id":"GO-2023-1471","summary":"Reflected XSS in Gotify's /docs via import of outdated Swagger UI in github.com/gotify/server","details":"Reflected XSS in Gotify's /docs via import of outdated Swagger UI in github.com/gotify/server","aliases":["GHSA-3244-8mff-w398"],"modified":"2026-03-03T04:53:13.580774Z","published":"2024-08-20T20:25:58Z","database_specific":{"url":"https://pkg.go.dev/vuln/GO-2023-1471","review_status":"UNREVIEWED"},"references":[{"type":"ADVISORY","url":"https://github.com/gotify/server/security/advisories/GHSA-3244-8mff-w398"},{"type":"FIX","url":"https://github.com/gotify/server/pull/541"},{"type":"WEB","url":"https://research.securitum.com/mutation-xss-via-mathml-mutation-dompurify-2-0-17-bypass"},{"type":"WEB","url":"https://www.vidocsecurity.com/blog/hacking-swagger-ui-from-xss-to-account-takeovers"}],"affected":[{"package":{"name":"github.com/gotify/server","ecosystem":"Go","purl":"pkg:golang/github.com/gotify/server"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"}]}],"ecosystem_specific":{},"database_specific":{"source":"https://vuln.go.dev/ID/GO-2023-1471.json"}},{"package":{"name":"github.com/gotify/server/v2","ecosystem":"Go","purl":"pkg:golang/github.com/gotify/server/v2"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"2.2.3"}]}],"ecosystem_specific":{},"database_specific":{"source":"https://vuln.go.dev/ID/GO-2023-1471.json"}}],"schema_version":"1.7.3"}