Filtered by vendor Gitblit Subscriptions
Filtered by product Gitblit Subscriptions
Total 4 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2025-50977 1 Gitblit 1 Gitblit 2025-08-29 6.1 Medium
A template injection vulnerability leading to reflected cross-site scripting (XSS) has been identified in version 1.7.1, requiring authenticated admin access for exploitation. The vulnerability exists in the 'r' parameter and allows attackers to inject malicious Angular expressions that execute JavaScript code in the context of the application. The flaw can be exploited through GET requests to the summary endpoint as well as POST requests to specific Wicket interface endpoints, though the GET method provides easier weaponization. This vulnerability enables authenticated administrators to execute arbitrary client-side code, potentially leading to session hijacking, data theft, or further privilege escalation attacks.
CVE-2025-50978 1 Gitblit 1 Gitblit 2025-08-29 6.1 Medium
In Gitblit v1.7.1, a reflected cross-site scripting (XSS) vulnerability exists in the way repository path names are handled. By injecting a specially crafted path payload an attacker can cause arbitrary JavaScript to execute when a victim views the manipulated URL. This flaw stems from insufficient input sanitization of filename elements.
CVE-2022-31268 1 Gitblit 1 Gitblit 2024-11-21 7.5 High
A Path Traversal vulnerability in Gitblit 1.9.3 can lead to reading website files via /resources//../ (e.g., followed by a WEB-INF or META-INF pathname).
CVE-2022-31267 1 Gitblit 1 Gitblit 2024-11-21 9.8 Critical
Gitblit 1.9.2 allows privilege escalation via the Config User Service: a control character can be placed in a profile data field, such as an emailAddress%3Atext 'attacker@example.com\n\trole = "#admin"' value.