MantisBT XXS where a Custom Field with a crafted Regular Expression property is used
Moderate severity
GitHub Reviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated May 29, 2025
Description
Published by the National Vulnerability Database
Sep 30, 2020
Published to the GitHub Advisory Database
May 24, 2022
Reviewed
May 29, 2025
Last updated
May 29, 2025
An issue was discovered in MantisBT before 2.24.3. When editing an Issue in a Project where a Custom Field with a crafted Regular Expression property is used, improper escaping of the corresponding form input's pattern attribute allows HTML injection and, if CSP settings permit, execution of arbitrary JavaScript.
References