Description
Exponent CMS 2.6.0patch2 allows an authenticated admin user to inject persistent JavaScript code inside the "Site/Organization Name","Site Title" and "Site Header" parameters while updating the site settings on "/exponentcms/administration/configure_site"
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-28157 | Exponent CMS 2.6.0patch2 allows an authenticated admin user to inject persistent JavaScript code inside the "Site/Organization Name","Site Title" and "Site Header" parameters while updating the site settings on "/exponentcms/administration/configure_site" |
References
History
No history.
Status: PUBLISHED
Assigner: Fluid Attacks
Published:
Updated: 2024-08-03T03:28:43.262Z
Reserved: 2022-01-10T00:00:00.000Z
Link: CVE-2022-23047
No data.
Status : Modified
Published: 2022-02-09T23:15:19.530
Modified: 2024-11-21T06:47:52.853
Link: CVE-2022-23047
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD