{"api_version":"1","generated_at":"2026-04-23T04:20:44+00:00","cve":"CVE-2021-43810","urls":{"html":"https://cve.report/CVE-2021-43810","api":"https://cve.report/api/cve/CVE-2021-43810.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-43810","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-43810"},"summary":{"title":"CVE-2021-43810","description":"Admidio is a free open source user management system for websites of organizations and groups. A cross-site scripting vulnerability is present in Admidio prior to version 4.0.12. The Reflected XSS vulnerability occurs because redirect.php does not properly validate the value of the url parameter. Through this vulnerability, an attacker is capable to execute malicious scripts. This issue is patched in version 4.0.12.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2021-12-07 22:15:00","updated_at":"2021-12-09 19:44:00"},"problem_types":["CWE-79"],"metrics":[],"references":[{"url":"https://github.com/Admidio/admidio/security/advisories/GHSA-3qgf-qgc3-42hh","name":"https://github.com/Admidio/admidio/security/advisories/GHSA-3qgf-qgc3-42hh","refsource":"CONFIRM","tags":[],"title":"Cross-site Scripting (XSS) when redirect an url · Advisory · Admidio/admidio · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/Admidio/admidio/commit/fcb0609abc1d2f65bc1377866bd678e5d891404b","name":"https://github.com/Admidio/admidio/commit/fcb0609abc1d2f65bc1377866bd678e5d891404b","refsource":"MISC","tags":[],"title":"Cross-site Scripting (XSS) when redirect an url · Admidio/admidio@fcb0609 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/Admidio/admidio/commit/c043267d362f7813543cc2785119bf3e3e54fe21","name":"https://github.com/Admidio/admidio/commit/c043267d362f7813543cc2785119bf3e3e54fe21","refsource":"MISC","tags":[],"title":"Merge pull request from GHSA-3qgf-qgc3-42hh · Admidio/admidio@c043267 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/Admidio/admidio/releases/tag/v4.0.12","name":"https://github.com/Admidio/admidio/releases/tag/v4.0.12","refsource":"MISC","tags":[],"title":"Release 4.0.12 · Admidio/admidio · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-43810","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-43810","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"43810","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"admidio","cpe5":"admidio","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2021-43810","STATE":"PUBLIC","TITLE":"Cross-site Scripting (XSS) when redirect an url"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"admidio","version":{"version_data":[{"version_value":"< 4.0.12"}]}}]},"vendor_name":"Admidio"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Admidio is a free open source user management system for websites of organizations and groups. A cross-site scripting vulnerability is present in Admidio prior to version 4.0.12. The Reflected XSS vulnerability occurs because redirect.php does not properly validate the value of the url parameter. Through this vulnerability, an attacker is capable to execute malicious scripts. This issue is patched in version 4.0.12."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"}]}]},"references":{"reference_data":[{"name":"https://github.com/Admidio/admidio/security/advisories/GHSA-3qgf-qgc3-42hh","refsource":"CONFIRM","url":"https://github.com/Admidio/admidio/security/advisories/GHSA-3qgf-qgc3-42hh"},{"name":"https://github.com/Admidio/admidio/commit/c043267d362f7813543cc2785119bf3e3e54fe21","refsource":"MISC","url":"https://github.com/Admidio/admidio/commit/c043267d362f7813543cc2785119bf3e3e54fe21"},{"name":"https://github.com/Admidio/admidio/commit/fcb0609abc1d2f65bc1377866bd678e5d891404b","refsource":"MISC","url":"https://github.com/Admidio/admidio/commit/fcb0609abc1d2f65bc1377866bd678e5d891404b"},{"name":"https://github.com/Admidio/admidio/releases/tag/v4.0.12","refsource":"MISC","url":"https://github.com/Admidio/admidio/releases/tag/v4.0.12"}]},"source":{"advisory":"GHSA-3qgf-qgc3-42hh","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2021-12-07 22:15:00","lastModifiedDate":"2021-12-09 19:44:00","problem_types":["CWE-79"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":6.1,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":2.7},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":4.3},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:admidio:admidio:*:*:*:*:*:*:*:*","versionEndExcluding":"4.0.12","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"43810","Ordinal":"221320","Title":"CVE-2021-43810","CVE":"CVE-2021-43810","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"43810","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}