First published: Thu Aug 26 2021(Updated: )
Cross-site scripting vulnerability in Edit Boilerplate screen of Movable Type (Movable Type 7 r.4903 and earlier (Movable Type 7 Series), Movable Type 6.8.0 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series), Movable Type Premium 1.44 and earlier, and Movable Type Premium Advanced 1.44 and earlier) allows remote attackers to inject arbitrary script or HTML via unspecified vectors.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Sixapart Movable Type | <=1.44 | |
Sixapart Movable Type | <=1.44 | |
Sixapart Movable Type | >=6.0<=6.8.0 | |
Sixapart Movable Type | >=7.0<7.8.0 | |
Sixapart Movable Type | >=7.0<7.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-20815 is a cross-site scripting vulnerability in the Edit Boilerplate screen of Movable Type.
The severity of CVE-2021-20815 is medium with a CVSS score of 6.1.
CVE-2021-20815 affects Movable Type 7 r.4903 and earlier (Movable Type 7 Series), Movable Type 6.8.0 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series), and Movable Type Premium 1.44 and earlier.
To fix CVE-2021-20815, upgrade to Movable Type 7.8.0 or Movable Type 6.8.1.
You can find more information about CVE-2021-20815 at the following references: [JVN website](https://jvn.jp/en/jp/JVN97545738/index.html) and [Movable Type news](https://movabletype.org/news/2021/08/mt-780-681-released.html).