First published: Fri Jul 02 2021(Updated: )
A stored cross scripting (XSS) vulnerability in CMS Made Simple 2.2.14 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the "Path for the {page_image} tag:" or "Path for thumbnail field:" parameters under the "Content Editing Settings" module.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cmsmadesimple Cms Made Simple | =2.2.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-36411 is medium, with a CVSS score of 5.4.
An attacker can exploit CVE-2020-36411 by entering a crafted payload into the "Path for the {page_image} tag:" or "Path for thumbnail field:" parameters in the "Content Editing Settings" module of CMS Made Simple 2.2.14.
CVE-2020-36411 allows an attacker to execute arbitrary web scripts or HTML.
Yes, CVE-2020-36411 can only be exploited by authenticated attackers.
To fix CVE-2020-36411, update CMS Made Simple to a version that is not affected by the vulnerability.