{"api_version":"1","generated_at":"2026-04-23T21:26:07+00:00","cve":"CVE-2023-30963","urls":{"html":"https://cve.report/CVE-2023-30963","api":"https://cve.report/api/cve/CVE-2023-30963.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-30963","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-30963"},"summary":{"title":"CVE-2023-30963","description":"A security defect was discovered in Foundry Frontend which enabled users to perform Stored XSS attacks in Slate if Foundry's CSP were to be bypassed. This defect was resolved with the release of Foundry Frontend 6.229.0. The service was rolled out to all affected Foundry instances. No further intervention is required.","state":"PUBLIC","assigner":"cve-coordination@palantir.com","published_at":"2023-07-10 22:15:00","updated_at":"2023-11-07 04:14:00"},"problem_types":["CWE-79"],"metrics":[],"references":[{"url":"https://palantir.safebase.us/?tcuUid=3c6b63b7-fb67-4202-a94a-9c83515efb8a","name":"https://palantir.safebase.us/?tcuUid=3c6b63b7-fb67-4202-a94a-9c83515efb8a","refsource":"MISC","tags":[],"title":"Palantir Trust and Security Portal | SafeBase","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-30963","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-30963","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"30963","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"palantir","cpe5":"foundry_frontend","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-30963","ASSIGNER":"cve-coordination@palantir.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"A security defect was discovered in Foundry Frontend which enabled users to perform Stored XSS attacks in Slate if Foundry's CSP were to be bypassed. This defect was resolved with the release of Foundry Frontend 6.229.0. The service was rolled out to all affected Foundry instances. No further intervention is required.\n\n"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"The web application does not neutralize or incorrectly neutralizes scripting elements within attributes of HTML IMG tags, such as the src attribute.","cweId":"CWE-82"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Palantir","product":{"product_data":[{"product_name":"com.palantir.foundry:foundry-frontend","version":{"version_data":[{"version_affected":"<","version_name":"*","version_value":"6.229.0"}]}}]}}]}},"references":{"reference_data":[{"url":"https://palantir.safebase.us/?tcuUid=3c6b63b7-fb67-4202-a94a-9c83515efb8a","refsource":"MISC","name":"https://palantir.safebase.us/?tcuUid=3c6b63b7-fb67-4202-a94a-9c83515efb8a"}]},"source":{"discovery":"EXTERNAL","defect":["PLTRSEC-2023-28"]},"impact":{"cvss":[{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseSeverity":"MEDIUM","baseScore":5.4}]}},"nvd":{"publishedDate":"2023-07-10 22:15:00","lastModifiedDate":"2023-11-07 04:14:00","problem_types":["CWE-79"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.3,"impactScore":2.7}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:palantir:foundry_frontend:*:*:*:*:*:*:*:*","versionEndExcluding":"6.229.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}