First published: Mon Nov 20 2023(Updated: )
A reflected cross-site scripting (XSS) vulnerability in the Community Edition version 9.0 of OS4ED's openSIS Classic allows remote attackers to execute arbitrary JavaScript in the web browser of a user, by including a malicious payload into the 'include' parameter in 'ForExport.php'
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OS4Ed OpenSIS | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-38882 is a reflected cross-site scripting (XSS) vulnerability in the Community Edition version 9.0 of OS4ED's openSIS Classic.
CVE-2023-38882 allows remote attackers to execute arbitrary JavaScript in the web browser of a user by including a malicious payload into the 'include' parameter in 'ForExport.php' in OS4ED's openSIS Classic.
CVE-2023-38882 has a severity keyword of 'medium' and a severity value of 6.1.
To fix CVE-2023-38882, it is recommended to update to a patched version of OS4ED's openSIS Classic as soon as it becomes available.
The Common Weakness Enumeration (CWE) for CVE-2023-38882 is CWE-79, which is the category for Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').