{"api_version":"1","generated_at":"2026-05-13T21:15:33+00:00","cve":"CVE-2020-25798","urls":{"html":"https://cve.report/CVE-2020-25798","api":"https://cve.report/api/cve/CVE-2020-25798.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-25798","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-25798"},"summary":{"title":"CVE-2020-25798","description":"A stored cross-site scripting (XSS) vulnerability in LimeSurvey before and including 3.21.1 allows authenticated users with correct permissions to inject arbitrary web script or HTML via parameter ParticipantAttributeNamesDropdown of the Attributes on the central participant database page. When the survey attribute being edited or viewed, e.g. by an administrative user, the JavaScript code will be executed in the browser.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2020-11-17 15:15:00","updated_at":"2020-11-27 14:37:00"},"problem_types":["CWE-79"],"metrics":[],"references":[{"url":"https://github.com/LimeSurvey/LimeSurvey/commit/38e1ab069b538de7cb5f3a04939aba8e835640cb","name":"https://github.com/LimeSurvey/LimeSurvey/commit/38e1ab069b538de7cb5f3a04939aba8e835640cb","refsource":"MISC","tags":["Patch","Third Party Advisory"],"title":"Fixed issue #15672: LimeSurvey 3.21.1 Cross Site Scripting · LimeSurvey/LimeSurvey@38e1ab0 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugs.limesurvey.org/view.php?id=15672","name":"https://bugs.limesurvey.org/view.php?id=15672","refsource":"MISC","tags":["Exploit","Issue Tracking","Vendor Advisory"],"title":"15672: LimeSurvey 3.21.1 Cross Site Scripting - LimeSurvey bugs and feature requests","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-25798","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-25798","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"25798","vulnerable":"1","versionEndIncluding":"3.21.1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"limesurvey","cpe5":"limesurvey","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2020-25798","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A stored cross-site scripting (XSS) vulnerability in LimeSurvey before and including 3.21.1 allows authenticated users with correct permissions to inject arbitrary web script or HTML via parameter ParticipantAttributeNamesDropdown of the Attributes on the central participant database page. When the survey attribute being edited or viewed, e.g. by an administrative user, the JavaScript code will be executed in the browser."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://bugs.limesurvey.org/view.php?id=15672","refsource":"MISC","name":"https://bugs.limesurvey.org/view.php?id=15672"},{"url":"https://github.com/LimeSurvey/LimeSurvey/commit/38e1ab069b538de7cb5f3a04939aba8e835640cb","refsource":"MISC","name":"https://github.com/LimeSurvey/LimeSurvey/commit/38e1ab069b538de7cb5f3a04939aba8e835640cb"}]}},"nvd":{"publishedDate":"2020-11-17 15:15:00","lastModifiedDate":"2020-11-27 14:37:00","problem_types":["CWE-79"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.3,"impactScore":2.7},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":3.5},"severity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:limesurvey:limesurvey:*:*:*:*:*:*:*:*","versionEndIncluding":"3.21.1","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"25798","Ordinal":"187216","Title":"CVE-2020-25798","CVE":"CVE-2020-25798","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"25798","Ordinal":"1","NoteData":"A stored cross-site scripting (XSS) vulnerability in LimeSurvey before and including 3.21.1 allows authenticated users with correct permissions to inject arbitrary web script or HTML via parameter ParticipantAttributeNamesDropdown of the Attributes on the central participant database page. When the survey attribute being edited or viewed, e.g. by an administrative user, the JavaScript code will be executed in the browser.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"25798","Ordinal":"2","NoteData":"2020-11-17","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"25798","Ordinal":"3","NoteData":"2020-11-17","Type":"Other","Title":"Modified"}]}}}