vulnerability
Arch Linux: Cross-site scripting (CVE-2021-32719)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 3 | (AV:N/AC:M/Au:S/C:N/I:P/A:N) | Jun 28, 2021 | Jul 11, 2025 | Nov 27, 2025 |
Severity
3
CVSS
(AV:N/AC:M/Au:S/C:N/I:P/A:N)
Published
Jun 28, 2021
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
In rabbitmq-server prior to version 3.8.18, when a federation link was displayed in the RabbitMQ management UI via the rabbitmq_federation_management plugin, its consumer tag was rendered without proper <script> tag sanitization, potentially allowing for JavaScript code execution in the context of the page.
Solution
arch-linux-upgrade-latest
References
- CVE-2021-32719
- https://attackerkb.com/topics/CVE-2021-32719
- URL-https://github.com/rabbitmq/rabbitmq-server/pull/3122
- URL-https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-5452-hxj4-773x
- URL-https://herolab.usd.de/security-advisories/usd-2021-0011/
- URL-https://security.archlinux.org/ASA-202107-17
- CWE-80
- CWE-79
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.