Description
An XSS vulnerability was discovered in WUZHI CMS 4.1.0. There is persistent XSS that allows remote attackers to inject arbitrary web script or HTML via the form[nickname] parameter to the index.php?m=core&f=set&v=sendmail URI. When the administrator accesses the "system settings - mail server" screen, the XSS payload is triggered.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-6427 | An XSS vulnerability was discovered in WUZHI CMS 4.1.0. There is persistent XSS that allows remote attackers to inject arbitrary web script or HTML via the form[nickname] parameter to the index.php?m=core&f=set&v=sendmail URI. When the administrator accesses the "system settings - mail server" screen, the XSS payload is triggered. |
References
| Link | Providers |
|---|---|
| https://github.com/wuzhicms/wuzhicms/issues/143 |
|
History
Mon, 05 May 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wuzhicms wuzhicms
|
|
| CPEs | cpe:2.3:a:wuzhicms:wuzhicms:4.1.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Wuzhicms wuzhi Cms
|
Wuzhicms wuzhicms
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T09:29:51.660Z
Reserved: 2018-07-22T00:00:00.000Z
Link: CVE-2018-14512
No data.
Status : Modified
Published: 2018-07-23T08:29:00.200
Modified: 2025-05-05T18:10:51.717
Link: CVE-2018-14512
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD