Cross-site Scripting (XSS) - Stored in answerdev/answer
Description
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.7.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CVE-2023-1536 is a stored XSS vulnerability in Answer (now Apache Answer) prior to 1.0.7, allowing attackers to inject malicious scripts via Markdown content.
CVE-2023-1536 is a stored cross-site scripting (XSS) vulnerability in the Answer Q&A platform, prior to version 1.0.7. The root cause is insufficient sanitization of Markdown input, which allows an attacker to include arbitrary HTML or JavaScript code in content that is later rendered to other users [1][2]. The fix implemented in commit c3743bad updates the Markdown parser to properly escape or strip dangerous XSS vectors [1].
An attacker can exploit this vulnerability by submitting a question, answer, or comment containing malicious Markdown. No authentication is strictly required if the platform allows anonymous contributions; otherwise, an authenticated user on the platform can still target other users who view the injected content. Since the injection is stored and persists on the server, every visitor to the affected page will execute the injected script, increasing the attack surface [2][4].
The impact of a successful exploit includes session theft, credential harvesting, defacement, or redirection to malicious sites. Because Answer is used as a community forum, help center, or knowledge management platform [3], the XSS can be used to compromise administrative accounts or exfiltrate sensitive internal information stored within the platform [4].
Apache Answer (formerly answerdev/answer) released version 1.0.7 to address this vulnerability. Users are strongly advised to upgrade immediately, as no workaround is documented. The vulnerability has been assigned a CVSS score of 6.1 (Medium) and was publicly disclosed via huntr.dev on March 21, 2023 [2][4].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/answerdev/answerGo | < 1.0.7 | 1.0.7 |
Affected products
2- answerdev/answerdev/answerv5Range: unspecified
Patches
11 file changed · +4 −1
pkg/converter/markdown.go+4 −1 modified@@ -32,7 +32,10 @@ func Markdown2HTML(source string) string { log.Error(err) return source } - return buf.String() + html := buf.String() + filter := bluemonday.NewPolicy() + html = filter.Sanitize(html) + return html } // Markdown2BasicHTML convert markdown to html ,Only basic syntax can be used
Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
4News mentions
0No linked articles in our index yet.