CVE-2024-32979
Severity CVSS v4.0:
Pending analysis
Type:
CWE-79
Cross-Site Scripting (XSS)
Publication date:
01/05/2024
Last modified:
26/08/2025
Description
Nautobot is a Network Source of Truth and Network Automation Platform built as a web application atop the Django Python framework with a PostgreSQL or MySQL database. It was discovered that due to improper handling and escaping of user-provided query parameters, a maliciously crafted Nautobot URL could potentially be used to execute a Reflected Cross-Site Scripting (Reflected XSS) attack against users. All filterable object-list views in Nautobot are vulnerable. This issue has been fixed in Nautobot versions 1.6.20 and 2.2.3. There are no known workarounds for this vulnerability.<br />
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:networktocode:nautobot:*:*:*:*:*:*:*:* | 1.5.0 (including) | 1.6.20 (excluding) |
| cpe:2.3:a:networktocode:nautobot:*:*:*:*:*:*:*:* | 2.0.0 (including) | 2.2.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/nautobot/nautobot/commit/42440ebd9b381534ad89d62420ebea00d703d64e
- https://github.com/nautobot/nautobot/pull/5646
- https://github.com/nautobot/nautobot/pull/5647
- https://github.com/nautobot/nautobot/security/advisories/GHSA-jxgr-gcj5-cqqg
- https://github.com/nautobot/nautobot/commit/42440ebd9b381534ad89d62420ebea00d703d64e
- https://github.com/nautobot/nautobot/pull/5646
- https://github.com/nautobot/nautobot/pull/5647
- https://github.com/nautobot/nautobot/security/advisories/GHSA-jxgr-gcj5-cqqg



