Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7556-p52v-pp8q

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

DBHcms v1.2.0 has a stored xss vulnerability as there is no htmlspecialchars function for '$_POST['pageparam_insert_name']' variable in dbhcms\mod\mod.page.edit.php line 227, A remote authenticated with admin user can exploit this vulnerability to hijack other users.

DBHcms v1.2.0 has a stored xss vulnerability as there is no htmlspecialchars function for '$_POST['pageparam_insert_name']' variable in dbhcms\mod\mod.page.edit.php line 227, A remote authenticated with admin user can exploit this vulnerability to hijack other users.

EPSS

Процентиль: 45%
0.00223
Низкий

Связанные уязвимости

CVSS3: 4.8
nvd
больше 5 лет назад

DBHcms v1.2.0 has a stored xss vulnerability as there is no htmlspecialchars function for '$_POST['pageparam_insert_name']' variable in dbhcms\mod\mod.page.edit.php line 227, A remote authenticated with admin user can exploit this vulnerability to hijack other users.

EPSS

Процентиль: 45%
0.00223
Низкий