{"api_version":"1","generated_at":"2026-04-20T04:39:35+00:00","cve":"CVE-2021-43817","urls":{"html":"https://cve.report/CVE-2021-43817","api":"https://cve.report/api/cve/CVE-2021-43817.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-43817","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-43817"},"summary":{"title":"CVE-2021-43817","description":"Collabora Online is a collaborative online office suite based on LibreOffice technology. In affected versions a reflected XSS vulnerability was found in Collabora Online. An attacker could inject unescaped HTML into a variable as they created the Collabora Online iframe, and execute scripts inside the context of the Collabora Online iframe. This would give access to a small set of user settings stored in the browser, as well as the session's authentication token which was also passed in at iframe creation time. Users should upgrade to Collabora Online 6.4.16 or higher or Collabora Online 4.2.20 or higher. Collabora Online Development Edition 21.11 is not affected.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2021-12-13 20:15:00","updated_at":"2021-12-15 21:59:00"},"problem_types":["CWE-79"],"metrics":[],"references":[{"url":"https://github.com/CollaboraOnline/online/security/advisories/GHSA-7f6h-v9mx-58q9","name":"https://github.com/CollaboraOnline/online/security/advisories/GHSA-7f6h-v9mx-58q9","refsource":"CONFIRM","tags":[],"title":"CVE-2021-43817: Reflected Cross-Site-Scripting vulnerability · Advisory · CollaboraOnline/online · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-43817","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-43817","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"43817","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"collabora","cpe5":"online","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2021-43817","STATE":"PUBLIC","TITLE":"Reflected Cross-Site-Scripting vulnerability in Collabora Online"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"online","version":{"version_data":[{"version_value":">= 6.0.0, < 6.4.16"},{"version_value":"< 4.2.20"}]}}]},"vendor_name":"CollaboraOnline"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Collabora Online is a collaborative online office suite based on LibreOffice technology. In affected versions a reflected XSS vulnerability was found in Collabora Online. An attacker could inject unescaped HTML into a variable as they created the Collabora Online iframe, and execute scripts inside the context of the Collabora Online iframe. This would give access to a small set of user settings stored in the browser, as well as the session's authentication token which was also passed in at iframe creation time. Users should upgrade to Collabora Online 6.4.16 or higher or Collabora Online 4.2.20 or higher. Collabora Online Development Edition 21.11 is not affected."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":8.2,"baseSeverity":"HIGH","confidentialityImpact":"LOW","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"}]}]},"references":{"reference_data":[{"name":"https://github.com/CollaboraOnline/online/security/advisories/GHSA-7f6h-v9mx-58q9","refsource":"CONFIRM","url":"https://github.com/CollaboraOnline/online/security/advisories/GHSA-7f6h-v9mx-58q9"}]},"source":{"advisory":"GHSA-7f6h-v9mx-58q9","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2021-12-13 20:15:00","lastModifiedDate":"2021-12-15 21:59:00","problem_types":["CWE-79"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":6.1,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":2.7},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":4.3},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:collabora:online:*:*:*:*:*:*:*:*","versionEndExcluding":"4.2.20","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:collabora:online:*:*:*:*:*:*:*:*","versionStartIncluding":"6.4.0","versionEndExcluding":"6.4.16","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"43817","Ordinal":"221341","Title":"CVE-2021-43817","CVE":"CVE-2021-43817","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"43817","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}