First published: Mon Jan 05 2015(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in concrete5 5.7.2.1, 5.7.2, and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) gName parameter in single_pages/dashboard/users/groups/bulkupdate.php or (2) instance_id parameter in tools/dashboard/sitemap_drag_request.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Concrete5 | <=5.7.2.1 | |
Concrete5 | =5.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9526 is classified as a medium severity vulnerability due to the potential for remote code execution through cross-site scripting.
To fix CVE-2014-9526, upgrade to the latest version of Concrete5 that is beyond 5.7.2.1.
CVE-2014-9526 affects Concrete5 versions 5.7.2.1, 5.7.2, and earlier versions.
CVE-2014-9526 is a cross-site scripting (XSS) vulnerability that allows attackers to inject arbitrary web scripts or HTML.
Yes, CVE-2014-9526 can be exploited in a live environment if user input is not properly validated or sanitized.