Browse all 4 CVE security advisories affecting GOautodial. AI-powered Chinese analysis, POCs, and references for each vulnerability.
GOautodial is an open-source contact center solution designed for outbound/inbound call campaigns and customer service operations. Historically, it has faced vulnerabilities including remote code execution, cross-site scripting, and privilege escalation, often stemming from improper input validation and access control flaws. The platform's modular architecture and third-party integrations have introduced additional attack surfaces. While no major public security incidents have been widely documented, the presence of four CVEs indicates ongoing security challenges that administrators must address through timely patching and hardening.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2019-25316 | GOautodial 4.0 - 'CreateEvent' Persistent Cross-Site Scripting — GOautodialCWE-79 | 6.4 | Medium | 2026-02-11 |
| CVE-2020-37018 | GOautodial 4.0 - Persistent Cross-Site Scripting — GOautodialCWE-79 | 6.4 | Medium | 2026-01-29 |
| CVE-2021-43176 | GOautodial 路径遍历漏洞 — GOautodial APICWE-23 | 8.8 | - | 2021-12-07 |
| CVE-2021-43175 | GOautodial 授权问题漏洞 — GOautodial APICWE-305 | 7.5 | - | 2021-12-07 |
This page lists every published CVE security advisory associated with GOautodial. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.