First published: Wed Feb 09 2022(Updated: )
Exponent CMS 2.6.0patch2 allows an authenticated user to inject persistent JavaScript code on the "User-Agent" header when logging in. When an administrator user visits the "User Sessions" tab, the JavaScript will be triggered allowing an attacker to compromise the administrator session.
Credit: help@fluidattacks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Exponentcms Exponent Cms | =2.6.0-patch2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23049 is classified as a medium severity vulnerability due to its potential to compromise administrator sessions.
To fix CVE-2022-23049, upgrade Exponent CMS to version 2.6.0-patch3 or higher to mitigate the vulnerability.
CVE-2022-23049 affects Exponent CMS version 2.6.0-patch2 users, particularly those with authenticated access.
CVE-2022-23049 allows an attacker to inject persistent JavaScript code which can lead to session hijacking of administrator accounts.
Yes, CVE-2022-23049 requires an authenticated user to exploit the vulnerability and inject JavaScript code.