Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-r5fq-j3c2-575m

Опубликовано: 08 окт. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 4.8
CVSS3: 4.3

Описание

OPEXUS FOIAXpress before 11.13.3.0 allows an administrative user to inject JavaScript or other content within the Annual Report Template. Injected content is executed in the context of other users when they generate an Annual Report. Successful exploitation allows the administrative user to perform actions on behalf of the target, including stealing session cookies, user credentials, or sensitive data.

OPEXUS FOIAXpress before 11.13.3.0 allows an administrative user to inject JavaScript or other content within the Annual Report Template. Injected content is executed in the context of other users when they generate an Annual Report. Successful exploitation allows the administrative user to perform actions on behalf of the target, including stealing session cookies, user credentials, or sensitive data.

EPSS

Процентиль: 18%
0.00059
Низкий

4.8 Medium

CVSS4

4.3 Medium

CVSS3

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 4.3
nvd
4 месяца назад

OPEXUS FOIAXpress before 11.13.3.0 allows an administrative user to inject JavaScript or other content within the Annual Report Template. Injected content is executed in the context of other users when they generate an Annual Report. Successful exploitation allows the administrative user to perform actions on behalf of the target, including stealing session cookies, user credentials, or sensitive data.

EPSS

Процентиль: 18%
0.00059
Низкий

4.8 Medium

CVSS4

4.3 Medium

CVSS3

Дефекты

CWE-79