Stored XSS in Name in kromitgmbh/titra


Reported on

Jun 3rd 2022


The application Titra is vulnerable to Stored XSS in user's name field.

Proof of Concept

Go to profile and under the name put the payload "><img src=# onerror=alert(document.domain)> Video POC:


This allows the attacker to execute malicious scripts in all the project members browser and it can lead to session hijacking, sensitive data exposure, and worse.

We are processing your report and will contact the kromitgmbh/titra team within 24 hours. 22 days ago
We created a GitHub Issue asking the maintainers to create a 21 days ago
saharshtapi modified the report
21 days ago
We have contacted a member of the kromitgmbh/titra team and are waiting to hear back 20 days ago
kromitgmbh/titra maintainer validated this vulnerability 18 days ago
saharshtapi has been awarded the disclosure bounty
The fix bounty is now up for grabs
The researcher's credibility has increased: +7
kromitgmbh/titra maintainer confirmed that a fix has been merged on e606b6 18 days ago
The fix bounty has been dropped
kromitgmbh/titra maintainer gave praise 18 days ago
thanks for reporting this!
The researcher's credibility has slightly increased as a result of the maintainer's thanks: +1
18 days ago


@admin Can you assign CVE?

Jamie Slome
18 days ago


Sorted 👍

to join this conversation