Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-48199: n/a

0
Unknown
VulnerabilityCVE-2023-48199cvecve-2023-48199
Published: Wed Nov 15 2023 (11/15/2023, 00:00:00 UTC)
Source: CVE Database V5

Description

HTML Injection vulnerability in the 'manageApiKeys' component in Grocy <= 4.0.3 allows attackers to inject arbitrary HTML content without script execution. This occurs when user-supplied data is not appropriately sanitized, enabling the injection of HTML tags through parameter values. The attacker can then manipulate page content in the QR code detail popup, often coupled with social engineering tactics, exploiting both the trust of users and the application's lack of proper input handling.

AI-Powered Analysis

AILast updated: 10/04/2025, 10:20:21 UTC

Technical Analysis

CVE-2023-48199 is an HTML Injection vulnerability identified in the 'manageApiKeys' component of Grocy, an open-source web-based self-hosted groceries and household management solution, affecting versions up to and including 4.0.3. The vulnerability arises because user-supplied input is not properly sanitized before being rendered in the QR code detail popup interface. Specifically, attackers can inject arbitrary HTML content into the page, although script execution (i.e., JavaScript) is not possible through this flaw. This limitation reduces the risk of direct cross-site scripting (XSS) attacks but still allows manipulation of the page's HTML structure and content. The injected HTML can be used to alter the appearance or behavior of the popup, potentially misleading users through social engineering tactics such as spoofing UI elements, displaying fraudulent messages, or tricking users into performing unintended actions. The vulnerability stems from insufficient input validation and output encoding in the affected component, which processes API key parameters. While no known exploits are currently reported in the wild, the flaw could be leveraged by attackers who have access to input fields or parameters that feed into the vulnerable component. The lack of a CVSS score indicates that the vulnerability has not yet been fully assessed for severity, but the technical details confirm that it is a published issue requiring attention.

Potential Impact

For European organizations using Grocy for inventory or household management, this vulnerability poses a risk primarily to the integrity and trustworthiness of the user interface. Although it does not allow script execution, the ability to inject arbitrary HTML can facilitate social engineering attacks that may lead to unauthorized actions, data disclosure, or user confusion. For example, attackers could craft deceptive content in the QR code popup to trick users into revealing sensitive information or performing unsafe operations. This is particularly concerning in environments where Grocy is used in shared or multi-user settings, such as small businesses, community kitchens, or institutional facilities. The impact on confidentiality and availability is limited since no direct code execution or system compromise is enabled by this flaw. However, the manipulation of UI elements can indirectly lead to security breaches if users are deceived into unsafe behaviors. Given Grocy's open-source nature and growing adoption in Europe, organizations relying on it should be aware of this vulnerability to maintain operational security and user trust.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately update Grocy to a version where this issue is patched once available. In the meantime, administrators can implement strict input validation and output encoding on all user-supplied data, especially in the 'manageApiKeys' component and QR code detail popup. Employing a Content Security Policy (CSP) that restricts the execution of inline scripts and limits resource loading can reduce the risk of exploitation. Additionally, educating users about the potential for deceptive content and encouraging cautious interaction with unexpected or suspicious UI elements can help mitigate social engineering risks. Monitoring application logs for unusual input patterns or attempts to inject HTML content may also aid in early detection. If feasible, restricting access to the API key management interface to trusted users and networks will reduce the attack surface. Finally, contributing to or following updates from the Grocy community and security advisories will ensure timely application of fixes.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-11-13T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68e0f3c6b66c7f7acdd3eaa2

Added to database: 10/4/2025, 10:15:34 AM

Last enriched: 10/4/2025, 10:20:21 AM

Last updated: 10/16/2025, 12:42:03 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats