Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-48198: n/a

0
Unknown
VulnerabilityCVE-2023-48198cvecve-2023-48198
Published: Wed Nov 15 2023 (11/15/2023, 00:00:00 UTC)
Source: CVE Database V5

Description

A Cross-Site Scripting (XSS) vulnerability in the 'product description' component within '/api/stock/products' of Grocy version <= 4.0.3 allows attackers to obtain a victim's cookies.

AI-Powered Analysis

AILast updated: 10/04/2025, 10:19:31 UTC

Technical Analysis

CVE-2023-48198 is a Cross-Site Scripting (XSS) vulnerability identified in the Grocy application, specifically within the 'product description' component accessed via the '/api/stock/products' endpoint. Grocy is an open-source web-based self-hosted groceries and household management solution. The vulnerability affects Grocy versions up to and including 4.0.3. The flaw allows an attacker to inject malicious scripts into the product description field, which is then rendered without proper sanitization or encoding. When a victim accesses the affected endpoint or views the product description, the malicious script executes in their browser context. This can lead to the theft of cookies, session tokens, or other sensitive information stored in the browser, potentially enabling session hijacking or unauthorized access to the victim's Grocy account. The vulnerability does not require authentication to exploit if the product description is publicly accessible or if an attacker can trick an authenticated user into viewing the malicious content. There is no CVSS score assigned yet, and no known exploits have been reported in the wild as of the published date. The absence of patch links suggests that a fix may not have been released at the time of reporting, emphasizing the need for users to apply updates once available or implement temporary mitigations.

Potential Impact

For European organizations using Grocy for inventory or household management, this XSS vulnerability poses a risk primarily to confidentiality and integrity. If exploited, attackers could steal session cookies, leading to account compromise and unauthorized access to potentially sensitive inventory or personal data. While Grocy is often used in small to medium business environments or by individuals, organizations relying on it for operational management could face disruption or data leakage. The impact is heightened in environments where Grocy is integrated with other internal systems or contains sensitive business data. Additionally, compromised accounts could be leveraged for further attacks within an organization's network. The vulnerability could also undermine user trust and compliance with data protection regulations such as GDPR, especially if personal data is exposed or mishandled due to the exploit.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first monitor for an official patch or update from the Grocy development team and apply it promptly once available. In the interim, administrators should restrict access to the Grocy instance to trusted users only, ideally behind VPNs or internal networks, to reduce exposure. Input validation and output encoding should be enforced on the product description field to prevent script injection; if possible, implement web application firewalls (WAFs) with rules to detect and block XSS payloads targeting the '/api/stock/products' endpoint. Educate users about the risks of clicking on suspicious links or viewing untrusted content within Grocy. Additionally, consider implementing Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the browser context. Regularly audit and sanitize existing product descriptions to remove any malicious or suspicious content. Finally, monitor logs for unusual activity that could indicate exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-11-13T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68e0f3c7b66c7f7acdd3eac0

Added to database: 10/4/2025, 10:15:35 AM

Last enriched: 10/4/2025, 10:19:31 AM

Last updated: 10/16/2025, 12:41:55 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats