Total
29 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2019-13029 | 1 Vanderbilt | 1 Redcap | 2025-03-19 | 3.5 LOW | 4.8 MEDIUM |
Multiple stored Cross-site scripting (XSS) issues in the admin panel and survey system in REDCap 8 before 8.10.20 and 9 before 9.1.2 allow an attacker to inject arbitrary malicious HTML or JavaScript code into a user's web browser. | |||||
CVE-2025-23110 | 1 Vanderbilt | 1 Redcap | 2025-02-25 | N/A | 6.1 MEDIUM |
An issue was discovered in REDCap 14.9.6. A Reflected cross-site scripting (XSS) vulnerability in the email-subject field exists while performing an upload of a CSV file containing a list of alert configurations. An attacker can send the victim a CSV file containing the XSS payload in the email-subject. Once the victim uploads the file, he automatically lands on a page to view the uploaded data. If the victim clicks on the email-subject value, it triggers the XSS payload. | |||||
CVE-2025-23111 | 1 Vanderbilt | 1 Redcap | 2025-02-25 | N/A | 4.7 MEDIUM |
An issue was discovered in REDCap 14.9.6. It allows HTML Injection via the Survey field name, exposing users to a redirection to a phishing website. An attacker can exploit this to trick the user that receives the survey into clicking on the field name, which redirects them to a phishing website. Thus, this allows malicious actions to be executed without user consent. | |||||
CVE-2025-23112 | 1 Vanderbilt | 1 Redcap | 2025-02-25 | N/A | 6.1 MEDIUM |
An issue was discovered in REDCap 14.9.6. A stored cross-site scripting (XSS) vulnerability allows authenticated users to inject malicious scripts into the Survey field name of Survey. When a user receive the survey, if he clicks on the field name, it triggers the XSS payload. | |||||
CVE-2025-23113 | 1 Vanderbilt | 1 Redcap | 2025-02-25 | N/A | 3.4 LOW |
An issue was discovered in REDCap 14.9.6. It has an action=myprojects&logout=1 CSRF issue in the alert-title while performing an upload of a CSV file containing a list of alert configuration. An attacker can send the victim a CSV file containing an HTML injection payload in the alert-title. Once the victim uploads the file, he automatically lands on a page to view the uploaded data. If the victim click on the alert-title value, it can trigger a logout request and terminates their session, or redirect to a phishing website. This vulnerability stems from the absence of CSRF protections on the logout functionality. | |||||
CVE-2024-56377 | 1 Vanderbilt | 1 Redcap | 2025-01-16 | N/A | 5.4 MEDIUM |
A stored cross-site scripting (XSS) vulnerability in survey titles of REDCap 14.9.6 allows authenticated users to inject malicious scripts into the Survey Title field or Survey Instructions. When a user receives a survey and clicks anywhere on the survey page to enter data, the crafted payload (which has been injected into all survey fields) is executed, potentially enabling the execution of arbitrary web scripts. | |||||
CVE-2024-56376 | 1 Vanderbilt | 1 Redcap | 2025-01-16 | N/A | 5.4 MEDIUM |
A stored cross-site scripting (XSS) vulnerability in the built-in messenger of REDCap 14.9.6 allows authenticated users to inject malicious scripts into the message field. When a user click on the received message, the crafted payload is executed, potentially enabling the execution of arbitrary web scripts. | |||||
CVE-2023-37798 | 1 Vanderbilt | 1 Redcap | 2024-11-21 | N/A | 5.4 MEDIUM |
A stored cross-site scripting (XSS) vulnerability in the new REDCap project creation function of Vanderbilt REDCap 13.1.35 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the project title parameter. | |||||
CVE-2023-37361 | 1 Vanderbilt | 1 Redcap | 2024-11-21 | N/A | 2.7 LOW |
REDCap 12.0.26 LTS and 12.3.2 Standard allows SQL Injection via scheduling, repeatforms, purpose, app_title, or randomization. | |||||
CVE-2022-42715 | 1 Vanderbilt | 1 Redcap | 2024-11-21 | N/A | 6.1 MEDIUM |
A reflected XSS vulnerability exists in REDCap before 12.04.18 in the Alerts & Notifications upload feature. A crafted CSV file will, when uploaded, trigger arbitrary JavaScript code execution. | |||||
CVE-2022-24127 | 1 Vanderbilt | 1 Redcap | 2024-11-21 | 3.5 LOW | 5.4 MEDIUM |
A Stored Cross-Site Scripting (XSS) vulnerability was discovered in ProjectGeneral/edit_project_settings.php in REDCap 12.0.11. This issue allows any user with project management permissions to inject arbitrary code into the project title (app_title) field when editing an existing project. The payload is then reflected within the title tag of the page. | |||||
CVE-2022-24004 | 1 Vanderbilt | 1 Redcap | 2024-11-21 | 3.5 LOW | 5.4 MEDIUM |
A Stored Cross-Site Scripting (XSS) vulnerability was discovered in Messenger/messenger_ajax.php in REDCap 12.0.11. This issue allows any authenticated user to inject arbitrary code into the messenger title (aka new_title) field when editing an existing conversation. The payload executes in the browser of any conversation participant with the sidebar shown. | |||||
CVE-2021-42136 | 1 Vanderbilt | 1 Redcap | 2024-11-21 | 3.5 LOW | 9.0 CRITICAL |
A stored Cross-Site Scripting (XSS) vulnerability in the Missing Data Codes functionality of REDCap before 11.4.0 allows remote attackers to execute JavaScript code in the client's browser by storing said code as a Missing Data Code value. This can then be leveraged to execute a Cross-Site Request Forgery attack to escalate privileges to administrator. | |||||
CVE-2020-27358 | 1 Vanderbilt | 1 Redcap | 2024-11-21 | 4.0 MEDIUM | 4.3 MEDIUM |
An issue was discovered in REDCap 8.11.6 through 9.x before 10. The messenger's CSV feature (that allows users to export their conversation threads as CSV) allows non-privileged users to export one another's conversation threads by changing the thread_id parameter in the request to the endpoint Messenger/messenger_download_csv.php?title=Hey&thread_id={THREAD_ID}. | |||||
CVE-2020-26713 | 1 Vanderbilt | 1 Redcap | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
REDCap 10.3.4 contains a XSS vulnerability in the ToDoList function with parameter sort. The information submitted by the user is immediately returned in the response and not escaped leading to the reflected XSS vulnerability. Attackers can exploit vulnerabilities to steal login session information or borrow user rights to perform unauthorized acts. | |||||
CVE-2020-26712 | 1 Vanderbilt | 1 Redcap | 2024-11-21 | 10.0 HIGH | 9.8 CRITICAL |
REDCap 10.3.4 contains a SQL injection vulnerability in the ToDoList function via sort parameter. The application uses the addition of a string of information from the submitted user that is not validated well in the database query, resulting in an SQL injection vulnerability where an attacker can exploit and compromise all databases. | |||||
CVE-2019-17121 | 1 Vanderbilt | 1 Redcap | 2024-11-21 | 3.5 LOW | 5.4 MEDIUM |
REDCap before 9.3.4 has XSS on the Customize & Manage Locking/E-signatures page via Lock Record Custom Text values. | |||||
CVE-2019-15127 | 1 Vanderbilt | 1 Redcap | 2024-11-21 | 3.5 LOW | 5.4 MEDIUM |
REDCap before 9.3.0 allows XSS attacks against non-administrator accounts on the Data Import Tool page via a CSV data import file. | |||||
CVE-2019-14937 | 1 Vanderbilt | 1 Redcap | 2024-11-21 | 6.0 MEDIUM | 7.5 HIGH |
REDCap before 9.3.0 allows time-based SQL injection in the edit calendar event via the cal_id parameter, such as cal_id=55 and sleep(3) to Calendar/calendar_popup_ajax.php. The attacker can obtain a user's login sessionid from the database, and then re-login into REDCap to compromise all data. | |||||
CVE-2017-7351 | 1 Vanderbilt | 1 Redcap | 2024-11-21 | 4.0 MEDIUM | 8.8 HIGH |
A SQL injection issue exists in a file upload handler in REDCap 7.x before 7.0.11 via a trailing substring to SendITController:upload. |