First published: Mon Nov 20 2023(Updated: )
A reflected cross-site scripting (XSS) vulnerability in the Community Edition version 9.0 of OS4ED's openSIS Classic allows remote attackers to execute arbitrary JavaScript in the web browser of a user, by including a malicious payload into any of the 'calendar_id', 'school_date', 'month' or 'year' parameters in 'CalendarModal.php'.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OS4ED openSIS-Classic | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-38881 is a reflected cross-site scripting (XSS) vulnerability in the Community Edition version 9.0 of OS4ED's openSIS Classic.
CVE-2023-38881 allows remote attackers to execute arbitrary JavaScript in the web browser of a user by including a malicious payload into the 'calendar_id', 'school_date', 'month', or 'year' parameters.
The severity of CVE-2023-38881 is medium with a CVSS score of 6.1.
To fix CVE-2023-38881, update to a patched version of OS4ED's openSIS Classic.
You can find more information about CVE-2023-38881 on GitHub (https://github.com/OS4ED/openSIS-Classic) and the OS4ED website (https://www.os4ed.com/).