First published: Fri Oct 20 2023(Updated: )
An issue was discovered in SuperWebMailer 9.00.0.01710. It allows spamtest_external.php XSS via a crafted filename.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Superwebmailer Superwebmailer | =9.00.0.01710 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-38191 is medium.
The affected software for CVE-2023-38191 is SuperWebMailer version 9.00.0.01710.
CVE-2023-38191 allows XSS attacks via a crafted filename in the spamtest_external.php file of SuperWebMailer.
To fix CVE-2023-38191, it is recommended to update SuperWebMailer to a version that addresses the XSS vulnerability.
More information about CVE-2023-38191 can be found at the following URLs: [Link 1](https://herolab.usd.de/security-advisories/) and [Link 2](https://herolab.usd.de/security-advisories/usd-2023-0012/).