Untriaged
Permalink
CVE-2026-35451
5.7 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): REQUIRED
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): NONE
- Availability impact (A): NONE
Activity log
- Created suggestion
Twenty: Stored XSS via BlockNote FileBlock
Twenty is an open source CRM. Prior to 1.20.6, a Stored Cross-Site Scripting (XSS) vulnerability exists in the BlockNote editor component. Due to a lack of protocol validation in the FileBlock component and insufficient server-side inspection of block content, an attacker can inject a javascript: URI into the url property of a file block. This allows the execution of arbitrary JavaScript when a user clicks on the malicious file attachment. This vulnerability is fixed in 1.20.6.
References
-
https://github.com/twentyhq/twenty/security/advisories/GHSA-7w89-7q26-gj7q exploitx_refsource_CONFIRM
Affected products
twenty
- ==< 1.20.6
Matching in nixpkgs
pkgs.gnome-2048
Obtain the 2048 tile
pkgs.wordpressPackages.themes.twentytwenty
None
pkgs.wordpressPackages.themes.twentynineteen
None
pkgs.wordpressPackages.themes.twentytwentyone
None
pkgs.wordpressPackages.themes.twentytwentytwo
None
Package maintainers
-
@hedning Tor Hedin Brønner <torhedinbronner@gmail.com>
-
@jtojnar Jan Tojnar <jtojnar@gmail.com>
-
@dasj19 Daniel Șerbănescu <daniel@serbanescu.dk>
-
@bobby285271 Bobby Rong <rjl931189261@126.com>