CVE-2020-37014
Tryton 5.4 - Persistent Cross-Site Scripting
CVSS Score
6.4
EPSS Score
0.0%
EPSS Percentile
0th
Tryton 5.4 contains a persistent cross-site scripting vulnerability in the user profile name input that allows remote attackers to inject malicious scripts. Attackers can exploit the vulnerability by inserting script payloads in the name field, which execute in the frontend and backend user interfaces.
| CWE | CWE-79 |
| Vendor | tryton |
| Product | tryton |
| Published | Jan 30, 2026 |
| Last Updated | Mar 5, 2026 |
Stay Ahead of the Next One
Get instant alerts for tryton tryton
Be the first to know when new medium vulnerabilities affecting tryton tryton are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Affected Versions
Tryton / Tryton
0 โค 5.4
References
exploit-db.com: https://www.exploit-db.com/exploits/48466 tryton.org: https://www.tryton.org/ tryton.org: https://www.tryton.org/download vulnerability-lab.com: https://www.vulnerability-lab.com/get_content.php?id=2233 vulncheck.com: https://www.vulncheck.com/advisories/tryton-persistent-cross-site-scripting
Credits
Benjamin Kunz Mejri