Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6gjm-f2rv-4hwc

Опубликовано: 05 фев. 2026
Источник: github
Github: Не прошло ревью
CVSS4: 5.1
CVSS3: 3.5

Описание

P5 FNIP-8x16A/FNIP-4xSH versions 1.0.20 and 1.0.11 suffer from a stored cross-site scripting vulnerability. Input passed to several GET/POST parameters is not properly sanitized before being returned to the user, allowing attackers to execute arbitrary HTML and script code in a user's browser session in the context of the affected site. This can be exploited by submitting crafted input to the label modification functionality, such as the 'lab4' parameter in config.html.

P5 FNIP-8x16A/FNIP-4xSH versions 1.0.20 and 1.0.11 suffer from a stored cross-site scripting vulnerability. Input passed to several GET/POST parameters is not properly sanitized before being returned to the user, allowing attackers to execute arbitrary HTML and script code in a user's browser session in the context of the affected site. This can be exploited by submitting crafted input to the label modification functionality, such as the 'lab4' parameter in config.html.

EPSS

Процентиль: 10%
0.00036
Низкий

5.1 Medium

CVSS4

3.5 Low

CVSS3

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 3.5
nvd
3 дня назад

P5 FNIP-8x16A/FNIP-4xSH versions 1.0.20 and 1.0.11 suffer from a stored cross-site scripting vulnerability. Input passed to several GET/POST parameters is not properly sanitized before being returned to the user, allowing attackers to execute arbitrary HTML and script code in a user's browser session in the context of the affected site. This can be exploited by submitting crafted input to the label modification functionality, such as the 'lab4' parameter in config.html.

EPSS

Процентиль: 10%
0.00036
Низкий

5.1 Medium

CVSS4

3.5 Low

CVSS3

Дефекты

CWE-79