{"api_version":"1","generated_at":"2026-04-22T22:50:36+00:00","cve":"CVE-2021-32718","urls":{"html":"https://cve.report/CVE-2021-32718","api":"https://cve.report/api/cve/CVE-2021-32718.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-32718","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-32718"},"summary":{"title":"CVE-2021-32718","description":"RabbitMQ is a multi-protocol messaging broker. In rabbitmq-server prior to version 3.8.17, a new user being added via management UI could lead to the user's bane being rendered in a confirmation message without proper `<script>` tag sanitization, potentially allowing for JavaScript code execution in the context of the page. In order for this to occur, the user must be signed in and have elevated permissions (other user management). The vulnerability is patched in RabbitMQ 3.8.17. As a workaround, disable `rabbitmq_management` plugin and use CLI tools for management operations and Prometheus and Grafana for metrics and monitoring.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2021-06-28 15:15:00","updated_at":"2021-12-10 19:57:00"},"problem_types":["CWE-79"],"metrics":[],"references":[{"url":"https://github.com/rabbitmq/rabbitmq-server/pull/3028","name":"https://github.com/rabbitmq/rabbitmq-server/pull/3028","refsource":"MISC","tags":[],"title":"Escape username before displaying it in a pop-up message by michaelklishin · Pull Request #3028 · rabbitmq/rabbitmq-server · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-c3hj-rg5h-2772","name":"https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-c3hj-rg5h-2772","refsource":"CONFIRM","tags":[],"title":"Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in RabbitMQ management UI · Advisory · rabbitmq/rabbitmq-server · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://seclists.org/fulldisclosure/2021/Dec/3","name":"20211203 usd AG Security Advisories 11/2021","refsource":"FULLDISC","tags":[],"title":"Full Disclosure: usd AG Security Advisories 11/2021","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-32718","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-32718","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"32718","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"vmware","cpe5":"rabbitmq","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2021-32718","qid":"183791","title":"Debian Security Update for rabbitmq-server (CVE-2021-32718)"},{"cve":"CVE-2021-32718","qid":"240980","title":"Red Hat Update for OpenStack Platform 16.2.4 (RHSA-2022:8851)"},{"cve":"CVE-2021-32718","qid":"240982","title":"Red Hat Update for OpenStack Platform 16.1.9 (RHSA-2022:8867)"},{"cve":"CVE-2021-32718","qid":"751191","title":"OpenSUSE Security Update for rabbitmq-server (openSUSE-SU-2021:1334-1)"},{"cve":"CVE-2021-32718","qid":"751206","title":"OpenSUSE Security Update for rabbitmq-server (openSUSE-SU-2021:3325-1)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2021-32718","STATE":"PUBLIC","TITLE":"Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in RabbitMQ management UI"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"rabbitmq-server","version":{"version_data":[{"version_value":"< 3.8.17"}]}}]},"vendor_name":"rabbitmq"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"RabbitMQ is a multi-protocol messaging broker. In rabbitmq-server prior to version 3.8.17, a new user being added via management UI could lead to the user's bane being rendered in a confirmation message without proper `<script>` tag sanitization, potentially allowing for JavaScript code execution in the context of the page. In order for this to occur, the user must be signed in and have elevated permissions (other user management). The vulnerability is patched in RabbitMQ 3.8.17. As a workaround, disable `rabbitmq_management` plugin and use CLI tools for management operations and Prometheus and Grafana for metrics and monitoring."}]},"impact":{"cvss":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":3.1,"baseSeverity":"LOW","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)"}]}]},"references":{"reference_data":[{"name":"https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-c3hj-rg5h-2772","refsource":"CONFIRM","url":"https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-c3hj-rg5h-2772"},{"name":"https://github.com/rabbitmq/rabbitmq-server/pull/3028","refsource":"MISC","url":"https://github.com/rabbitmq/rabbitmq-server/pull/3028"},{"refsource":"FULLDISC","name":"20211203 usd AG Security Advisories 11/2021","url":"http://seclists.org/fulldisclosure/2021/Dec/3"}]},"source":{"advisory":"GHSA-c3hj-rg5h-2772","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2021-06-28 15:15:00","lastModifiedDate":"2021-12-10 19:57:00","problem_types":["CWE-79"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.3,"impactScore":2.7},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":3.5},"severity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:vmware:rabbitmq:*:*:*:*:*:*:*:*","versionEndExcluding":"3.8.17","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"32718","Ordinal":"208106","Title":"CVE-2021-32718","CVE":"CVE-2021-32718","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"32718","Ordinal":"1","NoteData":"RabbitMQ is a multi-protocol messaging broker. In rabbitmq-server prior to version 3.8.17, a new user being added via management UI could lead to the user's bane being rendered in a confirmation message without proper `<script>` tag sanitization, potentially allowing for JavaScript code execution in the context of the page. In order for this to occur, the user must be signed in and have elevated permissions (other user management). The vulnerability is patched in RabbitMQ 3.8.17. As a workaround, disable `rabbitmq_management` plugin and use CLI tools for management operations and Prometheus and Grafana for metrics and monitoring.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"32718","Ordinal":"2","NoteData":"2021-06-28","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"32718","Ordinal":"3","NoteData":"2021-12-03","Type":"Other","Title":"Modified"}]}}}