First published: Fri Jul 02 2021(Updated: )
A stored cross scripting (XSS) vulnerability in CMS Made Simple 2.2.14 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the "Exclude these IP addresses from the "Site Down" status" parameter under the "Maintenance Mode" module.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cmsmadesimple Cms Made Simple | =2.2.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2020-36413.
The severity of CVE-2020-36413 is considered medium with a severity value of 5.4.
CVE-2020-36413 affects CMS Made Simple version 2.2.14.
An attacker can exploit CVE-2020-36413 by entering a crafted payload into the "Exclude these IP addresses from the "Site Down" status" parameter under the "Maintenance Mode" module.
Yes, upgrading to a version of CMS Made Simple that is not affected by this vulnerability is recommended to fix CVE-2020-36413.