First published: Fri Mar 24 2017(Updated: )
XSS exists in the CMS Made Simple (CMSMS) 2.1.6 "Content-->News-->Add Article" feature via the m1_title parameter. Someone must login to conduct the attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Really Simple CMS | =2.1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7255 is categorized with a moderate severity due to its XSS vulnerability that requires user authentication to exploit.
To fix CVE-2017-7255, upgrade to a patched version of CMS Made Simple that addresses the XSS vulnerability.
CVE-2017-7255 specifically affects CMS Made Simple version 2.1.6.
The impact of CVE-2017-7255 allows an authenticated attacker to execute arbitrary JavaScript code in the context of the user's browser session.
No, CVE-2017-7255 is not a remote exploit; it requires the attacker to be logged into the CMS.