-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.biouno:uno-choice | maven | <= 2.5.6 | 2.5.7 |
The vulnerability stems from unescaped parameter name insertion in multiple Jelly templates. The commit patching CVE-2021-21699 systematically adds h.escape() to: 1) jQuery selectors using paramName, 2) parameter name references in JavaScript constructors (it.getName()), 3) HTML element IDs (it.randomName). These locations directly inject user-controlled parameter names into DOM/JS contexts without sanitization in vulnerable versions, enabling stored XSS when attackers craft malicious parameter names.