First published: Thu Dec 02 2021(Updated: )
SakuraPanel v1.0.1.1 is affected by a Cross Site Scripting (XSS) vulnerability in /master/core/PostHandler.php. The exit function will terminate the script and print the message $data['proxy_name'].
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zerodream Sakurapanel | =1.0.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-43681.
The severity of CVE-2021-43681 is medium with a CVSS score of 6.1.
The affected software is SakuraPanel v1.0.1.1.
SakuraPanel v1.0.1.1 is affected by a Cross Site Scripting (XSS) vulnerability in /master/core/PostHandler.php. The exit function will terminate the script and print the message $data['proxy_name'].
To fix CVE-2021-43681, it is recommended to update SakuraPanel to a version that includes a patch for this vulnerability.