-
CVSS Score
-The vulnerability stems from unescaped usage of user-controlled input in status/index.jsp. The patch explicitly adds HTML encoding via Encode.forHtml() around the Util.getParameter() calls for 'title' and 'type' parameters. Before the fix, these parameters were directly embedded into the page without sanitization, creating XSS vectors. The root cause is the absence of output encoding when handling user-supplied data from Util.getParameter().
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.opennms:opennms | maven | < 31.0.4 | 31.0.4 |