First published: Mon Nov 20 2023(Updated: )
A reflected cross-site scripting (XSS) vulnerability in the Community Edition version 9.0 of OS4ED's openSIS Classic allows remote attackers to execute arbitrary JavaScript in the web browser of a user, by including a malicious payload into the 'ajax' parameter in 'ParentLookup.php'.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OS4Ed OpenSIS | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-38883 is a reflected cross-site scripting (XSS) vulnerability in the Community Edition version 9.0 of OS4ED's openSIS Classic.
CVE-2023-38883 allows remote attackers to execute arbitrary JavaScript in the web browser of a user by including a malicious payload into the 'ajax' parameter in 'ParentLookup.php'.
CVE-2023-38883 has a severity level of medium with a CVSS score of 6.1.
To fix CVE-2023-38883, it is recommended to update to a patched version of the Community Edition 9.0 of OS4ED's openSIS Classic. Ensure that you are using the latest version available.
You can find more information about CVE-2023-38883 on the OS4ED website (https://www.os4ed.com/) and the OS4ED's openSIS Classic GitHub repository (https://github.com/OS4ED/openSIS-Classic).