VYPR

Grocy

by Grocy Project

CVEs (10)

  • CVE-2024-55074Jan 6, 2025
    risk 0.00cvss epss 0.00

    The edit profile function of Grocy through 4.3.0 allows stored XSS and resultant privilege escalation by uploading a crafted HTML or SVG file, a different issue than CVE-2024-8370.

  • CVE-2024-55075Jan 6, 2025
    risk 0.00cvss epss 0.00

    Grocy through 4.3.0 allows remote attackers to obtain sensitive information via direct requests to pages that are not shown in the UI, such as calendar and recipes.

  • CVE-2024-55076Jan 6, 2025
    risk 0.00cvss epss 0.00

    Grocy through 4.3.0 has no CSRF protection, as demonstrated by changing the Administrator's password.

  • CVE-2024-8370Sep 1, 2024
    risk 0.00cvss epss 0.00

    A vulnerability classified as problematic was found in Grocy up to 4.2.0. This vulnerability affects unknown code of the file /api/files/recipepictures/ of the component SVG File Upload Handler. The manipulation of the argument force_serve_as with the input picture' leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. Unfortunately, the project maintainer does not want to be quoted in any way regarding the dispute rationale. The security policy of the project implies that this finding is "practically irrelevant" due to authentication requirements.

  • CVE-2023-48866Dec 4, 2023
    risk 0.00cvss epss 0.00

    A Cross-Site Scripting (XSS) vulnerability in the recipe preparation component within /api/objects/recipes and note component within /api/objects/shopping_lists/ of Grocy <= 4.0.3 allows attackers to obtain the victim's cookies.

  • CVE-2023-48199Nov 15, 2023
    risk 0.00cvss epss 0.01

    HTML Injection vulnerability in the 'manageApiKeys' component in Grocy <= 4.0.3 allows attackers to inject arbitrary HTML content without script execution. This occurs when user-supplied data is not appropriately sanitized, enabling the injection of HTML tags through parameter values. The attacker can then manipulate page content in the QR code detail popup, often coupled with social engineering tactics, exploiting both the trust of users and the application's lack of proper input handling.

  • CVE-2023-48198Nov 15, 2023
    risk 0.00cvss epss 0.01

    A Cross-Site Scripting (XSS) vulnerability in the 'product description' component within '/api/stock/products' of Grocy version <= 4.0.3 allows attackers to obtain a victim's cookies.

  • CVE-2023-48200Nov 15, 2023
    risk 0.00cvss epss 0.00

    Cross Site Scripting vulnerability in Grocy v.4.0.3 allows a local attacker to execute arbitrary code and obtain sensitive information via the equipment description component within /equipment/ component.

  • CVE-2023-48197Nov 15, 2023
    risk 0.00cvss epss 0.01

    Cross-Site Scripting (XSS) vulnerability in the ‘manageApiKeys’ component of Grocy 4.0.3 and earlier allows attackers to obtain victim's cookies when the victim clicks on the "see QR code" function.

  • CVE-2020-15253Oct 14, 2020
    risk 0.00cvss epss 0.01

    Versions of Grocy <= 2.7.1 are vulnerable to Cross-Site Scripting via the Create Shopping List module, that is rendered upon deleting that Shopping List. The issue was also found in users, batteries, chores, equipment, locations, quantity units, shopping locations, tasks, taskcategories, product groups, recipes and products. Authentication is required to exploit these issues and Grocy should not be publicly exposed. The linked reference details a proof-of-concept.