CVE-2021-44566
Description
A Cross Site Scripting (XSS) vulnerability exists in RosarioSIS before 4.3 via the SanitizeMarkDown function in ProgramFunctions/MarkDownHTML.fnc.php.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
RosarioSIS before 4.3 contains a stored XSS vulnerability due to insufficient input sanitization in the SanitizeMarkDown function.
Vulnerability
A stored Cross-Site Scripting (XSS) vulnerability exists in RosarioSIS versions before 4.3. The flaw resides in the SanitizeMarkDown function within ProgramFunctions/MarkDownHTML.fnc.php. The function fails to properly sanitize user-provided Markdown input, allowing injection of arbitrary HTML and JavaScript. Affected versions include all releases prior to the 4.3 branch [1][2].
Exploitation
An attacker with the ability to submit Markdown content—for example, through text areas or input fields that process Markdown—can inject malicious scripts. The attacker crafts Markdown containing HTML or JavaScript payloads. When the SanitizeMarkDown function processes this input, the insufficient filtering allows the malicious code to pass through unsanitized. No authentication is required if the vulnerable input fields are accessible to unauthenticated users; otherwise, an authenticated user with appropriate privileges can trigger the stored XSS [3].
Impact
Successful exploitation leads to stored XSS, where the injected script is permanently stored on the server and executed in the browser of any user viewing the affected content. This can result in session hijacking, data theft, defacement, or redirection to malicious sites. The attacker gains the ability to perform actions as the victim within the context of the RosarioSIS application, potentially compromising sensitive information [2][3].
Mitigation
The vulnerability was fixed in RosarioSIS version 4.3. The fix adds an explicit call to $security->xss_clean() on the generated Markdown output within the SanitizeMarkDown function [2]. Users should upgrade to RosarioSIS 4.3 or later. No workaround is documented; upgrading to the patched version is the recommended course of action. This CVE is not listed in CISA's Known Exploited Vulnerabilities Catalog [1].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
francoisjacquet/rosariosisPackagist | < 4.3 | 4.3 |
Affected products
2- RosarioSIS/RosarioSISdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-3756-hwhv-qw58ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2021-44566ghsaADVISORY
- gitlab.com/francoisjacquet/rosariosis/-/blob/mobile/CHANGES_V3_4.mdghsax_refsource_MISCWEB
- gitlab.com/francoisjacquet/rosariosis/-/commit/81886abb45a32e802151660de674f084afaef3aaghsax_refsource_MISCWEB
- gitlab.com/francoisjacquet/rosariosis/-/issues/259ghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.