VYPR
Moderate severityNVD Advisory· Published Feb 22, 2022· Updated Aug 4, 2024

CVE-2021-44566

CVE-2021-44566

Description

A Cross Site Scripting (XSS) vulnerability exists in RosarioSIS before 4.3 via the SanitizeMarkDown function in ProgramFunctions/MarkDownHTML.fnc.php.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

RosarioSIS before 4.3 contains a stored XSS vulnerability due to insufficient input sanitization in the SanitizeMarkDown function.

Vulnerability

A stored Cross-Site Scripting (XSS) vulnerability exists in RosarioSIS versions before 4.3. The flaw resides in the SanitizeMarkDown function within ProgramFunctions/MarkDownHTML.fnc.php. The function fails to properly sanitize user-provided Markdown input, allowing injection of arbitrary HTML and JavaScript. Affected versions include all releases prior to the 4.3 branch [1][2].

Exploitation

An attacker with the ability to submit Markdown content—for example, through text areas or input fields that process Markdown—can inject malicious scripts. The attacker crafts Markdown containing HTML or JavaScript payloads. When the SanitizeMarkDown function processes this input, the insufficient filtering allows the malicious code to pass through unsanitized. No authentication is required if the vulnerable input fields are accessible to unauthenticated users; otherwise, an authenticated user with appropriate privileges can trigger the stored XSS [3].

Impact

Successful exploitation leads to stored XSS, where the injected script is permanently stored on the server and executed in the browser of any user viewing the affected content. This can result in session hijacking, data theft, defacement, or redirection to malicious sites. The attacker gains the ability to perform actions as the victim within the context of the RosarioSIS application, potentially compromising sensitive information [2][3].

Mitigation

The vulnerability was fixed in RosarioSIS version 4.3. The fix adds an explicit call to $security->xss_clean() on the generated Markdown output within the SanitizeMarkDown function [2]. Users should upgrade to RosarioSIS 4.3 or later. No workaround is documented; upgrading to the patched version is the recommended course of action. This CVE is not listed in CISA's Known Exploited Vulnerabilities Catalog [1].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
francoisjacquet/rosariosisPackagist
< 4.34.3

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.