{"uuid": "e0060b22-df81-4d05-baa4-f7ece5fe4629", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-25929", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14173", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2021-25929\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In OpenNMS Horizon, versions opennms-1-0-stable through opennms-27.1.0-1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.6-1 are vulnerable to Stored Cross-Site Scripting since there is no validation on the input being sent to the `name` parameter in `noticeWizard` endpoint. Due to this flaw an authenticated attacker could inject arbitrary script and trick other admin users into downloading malicious files.\n\ud83d\udccf Published: 2021-05-20T14:09:45.000Z\n\ud83d\udccf Modified: 2025-04-30T20:22:43.392Z\n\ud83d\udd17 References:\n1. https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c\n2. https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25929\n3. https://github.com/OpenNMS/opennms/commit/66c1f626bf38a7d1a9530b4d68598269ee5245a2", "creation_timestamp": "2025-04-30T21:15:39.000000Z"}