Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-j9wp-x5q5-xh2f | Funadmin Cross-site Scripting vulnerability |
| Link | Providers |
|---|---|
| https://github.com/funadmin/funadmin/issues/31 |
|
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Mon, 28 Oct 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Funadmin
Funadmin funadmin |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:funadmin:funadmin:5.0.2:*:*:*:*:*:*:* | |
| Vendors & Products |
Funadmin
Funadmin funadmin |
|
| Metrics |
cvssV3_1
|
Fri, 25 Oct 2024 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue was found in funadmin 5.0.2. The selectfiles method in \backend\controller\sys\Attachh.php directly stores the passed parameters and values into the param parameter without filtering, resulting in Cross Site Scripting (XSS). | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-10-28T20:03:24.653Z
Reserved: 2024-10-08T00:00:00.000Z
Link: CVE-2024-48228
Updated: 2024-10-28T20:03:20.388Z
Status : Analyzed
Published: 2024-10-25T22:15:02.383
Modified: 2025-06-10T18:46:12.453
Link: CVE-2024-48228
No data.
OpenCVE Enrichment
No data.
Github GHSA