Ad

CVE-2026-33209

MEDIUM CVSS 4.0: 5.3 EPSS 0.01%
Updated Mar 23, 2026
Avohq
Parameter Value
CVSS 5.3 (MEDIUM)
Affected Versions before 3.30.3
Fixed In 3.30.3
Type CWE-79 (Cross-Site Scripting (XSS))
Vendor Avohq
Public PoC No

Avo is a framework to create admin panels for Ruby on Rails apps. Prior to version 3.30.3, a reflected cross-site scripting (XSS) vulnerability exists in the return_to query parameter used in the avo interface. An attacker can craft a malicious URL that injects arbitrary JavaScript, which is executed when he clicks a dynamically generated navigation button.

This issue has been patched in version 3.30.3.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Attack Requirements
None
No additional conditions
Privileges Required
None
No privileges needed
User Interaction
Passive
Minimal interaction

Impact Assessment

Confidentiality
None
No data leak
Integrity
None
No data modification
Availability
None
No disruption

CVSS Vector v4.0

Vulnerable Products 1

Configuration From (including) Up to (excluding)
Avohq Avo
cpe:2.3:a:avohq:avo:*:*:*:*:*:ruby:*:*
3.30.3