High severity7.1NVD Advisory· Published Jul 10, 2024· Updated Apr 15, 2026
CVE-2024-32469
CVE-2024-32469
Description
Decidim is a participatory democracy framework. The pagination feature used in searches and filters is subject to potential XSS attack through a malformed URL using the GET parameter per_page. This vulnerability is fixed in 0.27.6 and 0.28.1.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
decidimRubyGems | < 0.27.6 | 0.27.6 |
decidimRubyGems | >= 0.28.0.rc1, < 0.28.1 | 0.28.1 |
Patches
2928259cd7f57e1d4ac479795Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
6- github.com/advisories/GHSA-7cx8-44pc-xv3qghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-32469ghsaADVISORY
- github.com/decidim/decidim/releases/tag/v0.27.6nvdWEB
- github.com/decidim/decidim/releases/tag/v0.28.1nvdWEB
- github.com/decidim/decidim/security/advisories/GHSA-7cx8-44pc-xv3qnvdWEB
- github.com/rubysec/ruby-advisory-db/blob/master/gems/decidim/CVE-2024-32469.ymlghsaWEB
News mentions
0No linked articles in our index yet.