CVE-2021-47716

Orangescrum 1.8.0 contains multiple cross-site scripting vulnerabilities that allow authenticated attackers to inject malicious scripts through various input parameters. Attackers can exploit parameters like 'projid', 'CS_message', and 'name' to execute arbitrary JavaScript code in victim's browsers by submitting crafted payloads through application endpoints.
Configurations

Configuration 1 (hide)

cpe:2.3:a:orangescrum:orangescrum:1.8.0:*:*:*:*:*:*:*

History

31 Dec 2025, 17:15

Type Values Removed Values Added
First Time Orangescrum
Orangescrum orangescrum
CPE cpe:2.3:a:orangescrum:orangescrum:1.8.0:*:*:*:*:*:*:*
References () https://www.exploit-db.com/exploits/50554 - () https://www.exploit-db.com/exploits/50554 - Exploit
References () https://www.orangescrum.org/ - () https://www.orangescrum.org/ - Product
References () https://www.vulncheck.com/advisories/orangescrum-cross-site-scripting-via-authenticated-endpoints - () https://www.vulncheck.com/advisories/orangescrum-cross-site-scripting-via-authenticated-endpoints - Third Party Advisory

23 Dec 2025, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-23 20:15

Updated : 2025-12-31 17:15


NVD link : CVE-2021-47716

Mitre link : CVE-2021-47716

CVE.ORG link : CVE-2021-47716


JSON object : View

Products Affected

orangescrum

  • orangescrum
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')