First published: Tue May 02 2023(Updated: )
A vulnerability was found in Funadmin up to 3.2.3. It has been declared as problematic. Affected by this vulnerability is the function tagLoad of the file Cx.php. The manipulation of the argument file leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227869 was assigned to this vulnerability.
Credit: cna@vuldb.com cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Funadmin Funadmin | <=3.2.3 | |
<=3.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2477 has been declared as problematic, indicating a significant severity level.
To fix CVE-2023-2477, users should update Funadmin to version 3.2.4 or later.
CVE-2023-2477 is classified as a cross-site scripting (XSS) vulnerability.
CVE-2023-2477 affects all Funadmin versions up to and including 3.2.3.
Yes, CVE-2023-2477 can be exploited remotely, allowing attackers to execute malicious scripts.