First published: Sun Mar 02 2014(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in CMS Made Simple allow remote authenticated users to inject arbitrary web script or HTML via (1) the group parameter to admin/addgroup.php, (2) the htmlblob parameter to admin/addhtmlblob.php, the (3) title or (4) url parameter to admin/addbookmark.php, (5) the stylesheet_name parameter to admin/copystylesheet.php, (6) the template_name parameter to admin/copytemplate.php, the (7) title or (8) url parameter to admin/editbookmark.php, (9) the template parameter to admin/listtemplates.php, or (10) the css_name parameter to admin/listcss.php, a different issue than CVE-2014-2092.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Simple CMS | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0334 is classified as a medium severity vulnerability due to its potential for cross-site scripting attacks.
To fix CVE-2014-0334, update CMS Made Simple to the latest version where this vulnerability is patched.
CVE-2014-0334 allows for cross-site scripting attacks, enabling attackers to inject arbitrary web scripts or HTML.
CVE-2014-0334 affects remote authenticated users of CMS Made Simple.
CVE-2014-0334 impacts the group parameter in admin/addgroup.php, the htmlblob parameter in admin/addhtmlblob.php, and the title or url parameters in admin/addbookmark.php.