First published: Thu Feb 09 2023(Updated: )
Mojoportal v2.7.0.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the Company Info Settings component. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the txtCompanyName parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MojoPortal | =2.7.0.0 | |
=2.7.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-24687 is a stored cross-site scripting (XSS) vulnerability found in Mojoportal v2.7.0.0.
CVE-2023-24687 affects Mojoportal v2.7.0.0 by allowing attackers to execute arbitrary web scripts or HTML using a crafted payload in the txtCompanyName parameter of the Company Info Settings component.
CVE-2023-24687 has a severity rating of medium with a CVSS score of 5.4.
To fix CVE-2023-24687 in Mojoportal, it is recommended to update to the latest version of Mojoportal.
You can find more information about Mojoportal and CVE-2023-24687 in the following references: - [Mojoportal GitHub](https://github.com/i7MEDIA/mojoportal/) - [Mojoportal Website](https://www.mojoportal.com/) - [Advisory on GitHub](https://github.com/blakduk/Advisories/blob/main/Mojoportal/README.md)