First published: Thu Feb 06 2020(Updated: )
Cross-site scripting vulnerability in Movable Type series (Movable Type 7 r.4603 and earlier (Movable Type 7), Movable Type 6.5.2 and earlier (Movable Type 6.5), Movable Type Advanced 7 r.4603 and earlier (Movable Type Advanced 7), Movable Type Advanced 6.5.2 and earlier (Movable Type Advanced 6.5), Movable Type Premium 1.26 and earlier (Movable Type Premium), and Movable Type Premium Advanced 1.26 and earlier (Movable Type Premium Advanced)) allows remote attackers to inject arbitrary web script or HTML in the block editor and the rich text editor via a specially crafted URL.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Sixapart Movable Type | >=6.5.0<=6.5.2 | |
Sixapart Movable Type | >=7.0<=7.1.4 | |
Sixapart Movable Type | <=1.26 | |
Sixapart Movable Type | <=1.26 | |
Sixapart Movable Type | >=6.5.0<=6.5.2 | |
Sixapart Movable Type | >=7.0<=7.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-5528 is a cross-site scripting vulnerability in Movable Type series.
Movable Type 7 r.4603 and earlier (Movable Type 7), Movable Type 6.5.2 and earlier (Movable Type 6.5), Movable Type Advanced 7 r.4603 and earlier (Movable Type Advanced 7), Movable Type Advanced 6.5.2 and earlier (Movable Type Advanced 6.5).
The severity of CVE-2020-5528 is medium with a CVSS score of 6.1.
To fix the CVE-2020-5528 vulnerability, update Movable Type to version 7.2.0, 6.5.3, or 6.3.11 or later.
You can find more information about CVE-2020-5528 on the JVN website and the Movable Type release notes.