First published: Fri Jul 07 2023(Updated: )
A vulnerability has been found in ThinuTech ThinuCMS 1.5 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /author_posts.php. The manipulation of the argument author with the input g6g12<script>alert(1)</script>o8sdm leads to cross site scripting. The attack can be launched remotely. The identifier VDB-233293 was assigned to this vulnerability.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Thinu-cms | =1.5 | |
WebKit | ||
Microsoft Power Platform | ||
Azure Logic Apps | ||
Microsoft Windows | ||
Adobe Prelude | ||
Adobe Illustrator 2024 | ||
Adobe InDesign 2025 | ||
Adobe Dimension | ||
Adobe Experience Manager | ||
Adobe Substance 3D Stager | ||
Adobe Substance 3D Sampler | ||
Adobe After Effects 2025 | ||
Trimble ProDesign 3D | ||
Android | ||
SAP Business Technology Platform | ||
Bamboo | ||
Atlassian Bitbucket | ||
Atlassian Jira | ||
Atlassian Confluence Server/Data Center | ||
Atlassian Confluence Server and Data Server | ||
Apache Struts | ||
VMware Workspace ONE Launcher | ||
FortiOS | ||
FortiGuard FortiPAM |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID is CVE-2023-3541.
The title of the vulnerability is ThinuTech ThinuCMS author_posts.php cross site scripting.
The severity of CVE-2023-3541 is medium with a severity value of 6.1.
The affected software is ThinuTech ThinuCMS 1.5.
To fix CVE-2023-3541, apply the latest update or patch provided by ThinuTech.