Published: 2025/10/22  Last Updated: 2025/10/22

Information from GROWI, Inc.

Vulnerability ID:JVN#46526244
Title:GROWI vulnerable to cross-site scripting
Status:Vulnerable

This is a statement from the vendor itself with no modification by JPCERT/CC.

[Summary]
It has been discovered that our GROWI system has a cross-site scripting vulnerability.

[Affected Products]
This bug affects all versions of GROWI prior to v4.2.8.

[Description]
- A reflected cross-site scripting (XSS) vulnerability exists in the page alert function of "GROWI."

- This vulnerability is caused by improperly handling user input from URL query parameters, allowing an attacker to execute arbitrary JavaScript code.

[Impact]
- **Session Hijacking:** An attacker may steal user session cookies and gain unauthorized access to an account.
- **Website Defacement:** An attacker may inject scripts to alter the page's display or show false information.
- **Redirection to Malicious Sites:** Users may be automatically redirected to phishing sites or fraudulent websites to steal personal information (e.g., passwords, credit card details).
- **Malware Distribution:** An attacker may force a user's browser to download malware.
- **Sensitive Information Theft:** Scripts may be used to scrape and steal sensitive data, such as private documents or user lists, and send it to the attacker's server.

[Solution]
- Please update to v4.2.8 or a later version.

### Where to get the updated version
- [GitHub](https://github.com/weseek/growi)
- [Docker Hub](https://hub.docker.com/r/weseek/growi/)