CVSS 3.1 Score 6.1 of 10 (medium)


Published Dec 22, 2023
Updated: Jan 3, 2024


CVE-2023-50727 is a medium-severity vulnerability affecting Resque, a Redis-backed Ruby library used for creating background jobs. The vulnerability allows for a reflected cross-site scripting (XSS) attack when appending "/queues" with '/"><svg%20onload=alert(domain)>'. The issue has been patched in version 2.6.0. The vulnerability has a risk score of 27 and is categorized as CWE-79, which refers to the improper neutralization of input during web page generation. The affected products include various versions starting with 't_8fr' and 't_8fs'. Organizations should update to Resque version 2.6.0 to remediate the vulnerability and prevent potential exploitation through network-based attacks, although the impact is assessed as low in terms of integrity and confidentiality.

Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-50727 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options