CVE-2020-10203: Persistent Cross-Site scripting in Nexus Repository Manager
4.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.5693%
CWE
Published
4/14/2020
Updated
1/9/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.sonatype.nexus:nexus-core | maven | < 3.21.2 | 3.21.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability involves two key phases: 1) Unsanitized input through content selector creation REST endpoint, and 2) Unescaped output in UI rendering. The GHSL report explicitly identifies both the injection vector (REST API creation) and the XSS trigger point (front-end rendering). While no patch code is available, the component structure and vulnerability pattern indicate these are the most likely functions based on Nexus's architecture and standard XSS remediation patterns.