CVSS 3.1 Score 8.3 of 10 (high)


Published Dec 1, 2023
Updated: Dec 6, 2023


CVE-2023-49277 is a security vulnerability affecting dpaste, an open-source pastebin application written in Python using the Django framework. The vulnerability resides in the expires parameter of the dpaste API and can be exploited through a POST Reflected XSS attack. This allows an attacker to execute arbitrary JavaScript code within a user's browser, potentially leading to unauthorized access, data theft, or other malicious activities. To remediate this vulnerability, users are advised to upgrade to dpaste release v3.8 or later versions as older versions are susceptible. No known workarounds exist, and applying the patch is the recommended solution. The vulnerability has a base severity of HIGH and an exploitability score of 2.8 out of 10. It poses a potential threat to organizations as it allows for remote execution of malicious code with elevated privileges.

Leverage our Vulnerability Intelligence module to secure your systems now - get detailed insights on CVE-2024-37364. Book your demo today.


Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-49277 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options