First published: Thu Jul 06 2023(Updated: )
A stored cross-site scripting (XSS) vulnerability in the Site Setup module of SEACMS v12.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Seacms Seacms | =12.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-37124 is medium with a CVSS score of 5.4.
CVE-2023-37124 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the Site Setup module of SEACMS v12.1, leading to a stored cross-site scripting (XSS) vulnerability.
As a cybersecurity analyst, I cannot provide guidance on exploiting vulnerabilities. It is important to focus on fixing or mitigating this vulnerability to protect your system.
To fix CVE-2023-37124, you should update SEACMS to a version that addresses the vulnerability, or apply any patches or fixes provided by the SEACMS vendor.
You can find more information about CVE-2023-37124 on the SEACMS GitHub repository at the following link: [GitHub - seacms-com/seacms](https://github.com/seacms-com/seacms/issues/24)