First published: Sat Oct 21 2023(Updated: )
An issue was discovered in SuperWebMailer 9.00.0.01710. It allows keepalive.php XSS via a GET parameter.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Superwebmailer Superwebmailer | =9.00.0.01710 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-38194 is medium.
The affected software for CVE-2023-38194 is SuperWebMailer version 9.00.0.01710.
An attacker can exploit CVE-2023-38194 by injecting cross-site scripting (XSS) code via a GET parameter in the keepalive.php file.
There is no known fix available for CVE-2023-38194 at the moment.
You can find more information about CVE-2023-38194 at the following references: [1] [2]