First published: Fri Jul 02 2021(Updated: )
A stored cross scripting (XSS) vulnerability in CMS Made Simple 2.2.14 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the "Search Text" field under the "Admin Search" module.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cmsmadesimple Cms Made Simple | =2.2.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-36412 is medium with a CVSS score of 5.4.
Authenticated attackers can execute arbitrary web scripts or HTML by entering a crafted payload into the "Search Text" field under the "Admin Search" module.
Only version 2.2.14 of CMS Made Simple is affected by CVE-2020-36412.
Yes, authentication is required to exploit the stored cross scripting (XSS) vulnerability in CMS Made Simple 2.2.14.
Yes, it is recommended to upgrade CMS Made Simple to a version higher than 2.2.14 to fix CVE-2020-36412.