An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS03djdnLTl2eDYtdmNnMs4AAyoN

Goobi viewer Core Reflected Cross-Site Scripting Vulnerability Using LOGID Parameter


A reflected cross-site scripting vulnerability has been identified in Goobi viewer core when evaluating the LOGID parameter. An attacker could trick a user into following a specially crafted link to a Goobi viewer installation, resulting in the execution of malicious script code in the user's browser.


The vulnerability has been fixed in version 23.03


We would like to thank RUS-CERT for reporting this issues.

If you have any questions or comments about this advisory:

Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 1 year ago
Updated: over 1 year ago

CVSS Score: 6.1
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Identifiers: GHSA-7v7g-9vx6-vcg2, CVE-2023-29014
References: Repository:
Blast Radius: 1.0

Affected Packages

Affected Version Ranges: < 23.03
Fixed in: 23.03