VYPR
Moderate severityNVD Advisory· Published Feb 8, 2022· Updated Aug 4, 2024

CVE-2021-45329

CVE-2021-45329

Description

Cross Site Scripting (XSS) vulnerability exists in Gitea before 1.5.1 via the repository settings inside the external wiki/issue tracker URL field.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in Gitea before 1.5.1 via the external wiki/issue tracker URL field allows attackers to inject arbitrary JavaScript.

Vulnerability

A stored cross-site scripting (XSS) vulnerability exists in Gitea versions prior to 1.5.1 [2]. The issue resides in the repository settings page, specifically the external wiki and issue tracker URL fields. User-supplied input for these fields is not properly sanitized before being stored and later rendered in the user interface. This allows an attacker to inject arbitrary HTML or JavaScript code through a crafted URL value. The vulnerability was fixed in Gitea 1.5.1 via pull request #4710, which improved URL validation [3].

Exploitation

To exploit this vulnerability, an attacker must have the ability to modify repository settings (e.g., a repository collaborator with write access or an administrator). The attacker sets the external wiki or issue tracker URL to a malicious payload such as javascript:alert(1) or a crafted URL containing an XSS vector. When any user views the repository settings page or the external link is loaded, the injected script executes in the context of the victim's browser session. No user interaction beyond viewing the affected page is required.

Impact

Successful exploitation results in arbitrary JavaScript execution within the victim's session. This can lead to session hijacking, theft of sensitive information (e.g., authentication tokens, private repository data), unauthorized actions performed on behalf of the victim, or defacement. The attacker gains the same privileges as the victim user, potentially including repository administration if the victim is an admin.

Mitigation

The vulnerability is patched in Gitea version 1.5.1, released on September 11, 2018 [2]. Users are strongly advised to upgrade to at least this version. If upgrading is not immediately possible, restrict write access to repository settings to only trusted users and avoid viewing settings pages from untrusted accounts. No other workarounds are documented in the available references. The CVE is not listed in CISA's Known Exploited Vulnerabilities catalog.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/go-gitea/giteaGo
< 1.5.11.5.1

Affected products

3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.