๐Ÿ” CVE Alert

CVE-2020-37014

MEDIUM 6.4

Tryton 5.4 - Persistent Cross-Site Scripting

CVSS Score
6.4
EPSS Score
0.0%
EPSS Percentile
0th

Tryton 5.4 contains a persistent cross-site scripting vulnerability in the user profile name input that allows remote attackers to inject malicious scripts. Attackers can exploit the vulnerability by inserting script payloads in the name field, which execute in the frontend and backend user interfaces.

CWE CWE-79
Vendor tryton
Product tryton
Published Jan 30, 2026
Last Updated Mar 5, 2026
Stay Ahead of the Next One

Get instant alerts for tryton tryton

Be the first to know when new medium vulnerabilities affecting tryton tryton are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None

Affected Versions

Tryton / Tryton
0 โ‰ค 5.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
exploit-db.com: https://www.exploit-db.com/exploits/48466 tryton.org: https://www.tryton.org/ tryton.org: https://www.tryton.org/download vulnerability-lab.com: https://www.vulnerability-lab.com/get_content.php?id=2233 vulncheck.com: https://www.vulncheck.com/advisories/tryton-persistent-cross-site-scripting

Credits

Benjamin Kunz Mejri