{"api_version":"1","generated_at":"2026-04-23T16:54:31+00:00","cve":"CVE-2021-38681","urls":{"html":"https://cve.report/CVE-2021-38681","api":"https://cve.report/api/cve/CVE-2021-38681.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-38681","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-38681"},"summary":{"title":"CVE-2021-38681","description":"A reflected cross-site scripting (XSS) vulnerability has been reported to affect QNAP NAS running Ragic Cloud DB. If exploited, this vulnerability allows remote attackers to inject malicious code. QNAP have already disabled and removed Ragic Cloud DB from the QNAP App Center, pending a security patch from Ragic.","state":"PUBLIC","assigner":"security@qnap.com","published_at":"2021-11-20 01:15:00","updated_at":"2021-11-23 13:50:00"},"problem_types":["CWE-79"],"metrics":[],"references":[{"url":"https://www.qnap.com/en/security-advisory/qsa-21-48","name":"N/A","refsource":"CONFIRM","tags":[],"title":"Reflected XSS Vulnerability in Ragic Cloud DB - Security Advisory | QNAP","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-38681","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-38681","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"38681","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"qnap","cpe5":"nas","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"38681","vulnerable":"1","versionEndIncluding":"3.7.0.1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qnap","cpe5":"ragic_cloud_db","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security@qnap.com","DATE_PUBLIC":"2021-11-18T23:43:00.000Z","ID":"CVE-2021-38681","STATE":"PUBLIC","TITLE":"Reflected XSS Vulnerability in Ragic Cloud DB"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Ragic Cloud DB","version":{"version_data":[{"version_affected":"<=","version_value":"3.7.0.1"}]}}]},"vendor_name":"Negocios"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A reflected cross-site scripting (XSS) vulnerability has been reported to affect QNAP NAS running Ragic Cloud DB. If exploited, this vulnerability allows remote attackers to inject malicious code. QNAP have already disabled and removed Ragic Cloud DB from the QNAP App Center, pending a security patch from Ragic."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.3,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-79"}]}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://www.qnap.com/en/security-advisory/qsa-21-48","name":"https://www.qnap.com/en/security-advisory/qsa-21-48"}]},"source":{"advisory":"QSA-21-48","discovery":"EXTERNAL"},"work_around":[{"lang":"eng","value":"QNAP have already disabled and removed Ragic Cloud DB from the QNAP App Center, pending a security patch from Ragic. To secure your device, we recommend uninstalling Ragic Cloud DB until a security patch is available."}]},"nvd":{"publishedDate":"2021-11-20 01:15:00","lastModifiedDate":"2021-11-23 13:50:00","problem_types":["CWE-79"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":2.5},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":4.3},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:qnap:ragic_cloud_db:*:*:*:*:*:*:*:*","versionEndIncluding":"3.7.0.1","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:qnap:nas:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"38681","Ordinal":"214352","Title":"CVE-2021-38681","CVE":"CVE-2021-38681","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"38681","Ordinal":"1","NoteData":"A reflected cross-site scripting (XSS) vulnerability has been reported to affect QNAP NAS running Ragic Cloud DB. If exploited, this vulnerability allows remote attackers to inject malicious code. QNAP have already disabled and removed Ragic Cloud DB from the QNAP App Center, pending a security patch from Ragic.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"38681","Ordinal":"2","NoteData":"2021-11-19","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"38681","Ordinal":"3","NoteData":"2021-11-19","Type":"Other","Title":"Modified"}]}}}