### [CVE-2024-6585](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6585) ![](https://img.shields.io/static/v1?label=Product&message=Lightdash&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=0.1024.6%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brightgreen) ### Description Multiple stored cross-site scripting (“XSS”) vulnerabilities in the markdown dashboard and dashboard comment functionality of Lightdash version 0.1024.6 allows remote authenticated threat actors to inject malicious scripts into vulnerable web pages. A threat actor could potentially exploit this vulnerability to store malicious JavaScript which executes in the context of a user’s session with the application. ### POC #### Reference - https://github.com/google/security-research/security/advisories/GHSA-6529-6jv3-66q2 #### Github - https://github.com/fkie-cad/nvd-json-data-feeds