First published: Fri Apr 14 2023(Updated: )
A vulnerability was found in EyouCms up to 1.6.2. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /yxcms/index.php?r=admin/extendfield/mesedit&tabid=12&id=4 of the component HTTP POST Request Handler. The manipulation of the argument web_ico leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225943.
Credit: cna@vuldb.com cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Eyoucms Eyoucms | <=1.6.2 | |
<=1.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this EyouCms vulnerability is CVE-2023-2058.
The severity rating of CVE-2023-2058 is medium (6.1).
The affected software version of CVE-2023-2058 is EyouCms up to 1.6.2.
The CWE ID associated with CVE-2023-2058 is CWE-79 (Cross-Site Scripting).
You can find more information about CVE-2023-2058 on the following references: [GitHub](https://github.com/sleepyvv/vul_report/blob/main/EYOUCMS/XSS2.md), [VulDB](https://vuldb.com/?ctiid.225943), [VulDB](https://vuldb.com/?id.225943).