First published: Tue Mar 06 2018(Updated: )
The management panel in Piwigo 2.9.3 has stored XSS via the virtual_name parameter in a /admin.php?page=cat_list request, a different issue than CVE-2017-9836. CSRF exploitation, related to CVE-2017-10681, may be possible.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Piwigo Piwigo | =2.9.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7723 is a vulnerability in the management panel of Piwigo 2.9.3 that allows for stored Cross-Site Scripting (XSS) attacks.
CVE-2018-7723 has a severity score of 5.4, which is considered medium severity.
CVE-2018-7723 affects Piwigo 2.9.3, allowing for stored XSS attacks via the virtual_name parameter in a /admin.php?page=cat_list request.
At the time of this writing, there is no official fix available for CVE-2018-7723. It is recommended to follow the mitigation steps provided by the vendor or consider upgrading to a patched version when it becomes available.
Yes, there is a known exploit available for CVE-2018-7723. The vulnerability details and exploit code can be found at the provided reference link.