Description
In MODX Revolution 2.5.7, the "key" and "name" parameters in the System Settings module are vulnerable to XSS. A malicious payload sent to connectors/index.php will be triggered by every user, when they visit this module.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2017-3354 | In MODX Revolution 2.5.7, the "key" and "name" parameters in the System Settings module are vulnerable to XSS. A malicious payload sent to connectors/index.php will be triggered by every user, when they visit this module. |
References
| Link | Providers |
|---|---|
| https://github.com/modxcms/revolution/issues/13564 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-16T23:16:29.477Z
Reserved: 2017-07-30T00:00:00.000Z
Link: CVE-2017-11744
No data.
Status : Modified
Published: 2017-07-30T15:29:00.187
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-11744
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD