Teedy v1.11 - Stored cross-site scripting (XSS)

5.7

Medium

Discovered by 

Renzo Machado

Offensive Team, Fluid Attacks

Summary

Full name

Teedy v1.11 - Stored cross-site scripting (XSS)

Code name

State

Public

Release date

Sep 25, 2023

Affected product

Teedy

Affected version(s)

Version 1.11

Vulnerability name

Stored cross-site scripting (XSS)

Remotely exploitable

Yes

CVSS v3.1 vector string

CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N

CVSS v3.1 base score

5.7

Exploit available

Yes

CVE ID(s)

Description

Teedy v1.11 has a vulnerability in its text editor that allows events to be executed in HTML tags that an attacker could manipulate. Thanks to this, it is possible to execute malicious JavaScript in the webapp.

Vulnerability

A Stored cross-site scripting (XSS) vulnerability was identified in Teedy v1.11, which can allow an attacker to steal data such as session cookies or even steal private documents from other users. This vulnerability can be exploited in case a user wants to modify the malicious document created by the attacker.

Exploitation

To exploit this vulnerability go to Home -> Add a document -> Edit -> Save -> Edit the created document (this is where the XSS is executed).

It should be clarified that the attacker needs access to the platform in order to exploit this vulnerability. This would be an example of a functional payload:

<img src=x onerror=alert(document.cookie)>

This payload only retrieves the user's cookie and displays it on the screen, but an attacker could send it to a remote server to steal another user's session.

Our security policy

We have reserved the ID CVE-2023-4892 to refer to this issue from now on. Disclosure policy

System Information

  • Version: Teedy v1.11 (2023-03-12)

  • Operating System: MacOS

Mitigation

An updated version of Teedy is available at the vendor page.

References

Timeline

Vulnerability discovered

Sep 11, 2023

Vendor contacted

Sep 12, 2023

Public disclosure

Sep 25, 2023

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which organizations of all sizes are already enjoying.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which organizations of all sizes are already enjoying.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which organizations of all sizes are already enjoying.

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.

SOC 2 Type II

SOC 3

Subscribe to our newsletter

Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.

© 2025 Fluid Attacks. We hack your software.

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.

SOC 2 Type II

SOC 3

Subscribe to our newsletter

Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.

© 2025 Fluid Attacks. We hack your software.

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.

SOC 2 Type II

SOC 3

Subscribe to our newsletter

Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.

© 2025 Fluid Attacks. We hack your software.