First published: Mon May 16 2022(Updated: )
atmail 6.5.0 allows XSS via the index.php/admin/index/ error parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Phlymail | =6.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this atmail vulnerability is CVE-2022-30776.
The title of this atmail vulnerability is 'atmail 6.5.0 allows XSS via the index.php/admin/index/ error parameter.'
The severity level of CVE-2022-30776 is medium.
The vulnerability in atmail 6.5.0 occurs when an attacker is able to inject malicious scripts into the 'error' parameter of the 'index.php/admin/index/' page, leading to cross-site scripting (XSS) attacks.
Yes, there is a fix available for this atmail vulnerability. It is recommended to update to a version of atmail that is not affected by this vulnerability.