Description
The input fields of the Apache Pluto UrlTestPortlet are vulnerable to Cross-Site Scripting (XSS) attacks. Users should migrate to version 3.1.1 of the v3-demo-portlet.war artifact
Remediation
References
https://lists.apache.org/thread/x7kt47bf358x8sg9qg02zt0dmdrtow25
Related Vulnerabilities
CVE-2022-34169 Vulnerability in maven package xalan:xalan
CVE-2020-13921 Vulnerability in maven package org.apache.skywalking:storage-jdbc-hikaricp-plugin
CVE-2022-28220 Vulnerability in maven package org.apache.james:james-server-protocols-managesieve
CVE-2023-29215 Vulnerability in maven package org.apache.linkis:linkis-common
CVE-2021-41084 Vulnerability in maven package org.http4s:http4s-server_3