First published: Thu Mar 12 2020(Updated: )
Reflected XSS in admin/edit-template.php in Chadha PHPKB Standard Multi-Language 9 allows attackers to inject arbitrary web script or HTML via the GET parameter p.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Chadhaajay Phpkb | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-10463.
The severity of CVE-2020-10463 is medium (4.8).
The Chadha PHPKB Standard Multi-Language version 9.0 is affected by CVE-2020-10463.
An attacker can exploit CVE-2020-10463 by injecting arbitrary web script or HTML via the GET parameter p in the admin/edit-template.php file.
Yes, you can refer to the following links for more information: [link1](http://antoniocannito.it/?p=342#xss2) and [link2](https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-editing-a-template-cve-2020-10463).