{"api_version":"1","generated_at":"2026-04-30T00:01:24+00:00","cve":"CVE-2023-0357","urls":{"html":"https://cve.report/CVE-2023-0357","api":"https://cve.report/api/cve/CVE-2023-0357.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-0357","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-0357"},"summary":{"title":"CVE-2023-0357","description":"Helpy version 2.8.0 allows an unauthenticated remote attacker to exploit an XSS stored in the application. This is possible because the application does not correctly validate the attachments sent by customers in the ticket.","state":"PUBLIC","assigner":"help@fluidattacks.com","published_at":"2023-04-04 23:15:00","updated_at":"2023-04-10 18:17:00"},"problem_types":["CWE-79"],"metrics":[],"references":[{"url":"https://github.com/helpyio/helpy/","name":"https://github.com/helpyio/helpy/","refsource":"MISC","tags":[],"title":"GitHub - helpyio/helpy: Helpy is a modern, open source helpdesk customer support application. Features include knowledgebase, community discussions and support tickets integrated with email.","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://fluidattacks.com/advisories/quayle/","name":"https://fluidattacks.com/advisories/quayle/","refsource":"MISC","tags":[],"title":"Helpy 2.8.0 - Stored Cross-Site Scripting | Advisories | Fluid Attacks","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-0357","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-0357","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"357","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"helpy.io","cpe5":"helpy","cpe6":"2.8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2023-0357","ASSIGNER":"help@fluidattacks.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"Helpy","version":{"version_data":[{"version_value":"2.8.0"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Stored cross-site scripting (XSS)"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://fluidattacks.com/advisories/quayle/","url":"https://fluidattacks.com/advisories/quayle/"},{"refsource":"MISC","name":"https://github.com/helpyio/helpy/","url":"https://github.com/helpyio/helpy/"}]},"description":{"description_data":[{"lang":"eng","value":"Helpy version 2.8.0 allows an unauthenticated remote attacker to exploit an XSS stored in the application. This is possible because the application does not correctly validate the attachments sent by customers in the ticket."}]}},"nvd":{"publishedDate":"2023-04-04 23:15:00","lastModifiedDate":"2023-04-10 18:17:00","problem_types":["CWE-79"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":6.1,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":2.7}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:helpy.io:helpy:2.8.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}