First published: Mon Sep 25 2023(Updated: )
Cross-Site Scripting (XSS) vulnerability in cmsmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted payload injected into the Database Name, DataBase User or Database Port components.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cmsmadesimple Cmsmadesimple | =2.2.18 | |
Cmsmadesimple Cms Made Simple | =2.2.18 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-43339.
The severity of CVE-2023-43339 is medium.
The affected software is CMS Made Simple version 2.2.18.
A local attacker can exploit CVE-2023-43339 by injecting a crafted payload into the Database Name, DataBase User, or Database Port components.
Yes, you can find more information at the following references: [http://www.cmsmadesimple.org/](http://www.cmsmadesimple.org/), [https://github.com/sromanhu/CVE-2023-43339-CMSmadesimple-Reflected-XSS---Installation/blob/main/README.md](https://github.com/sromanhu/CVE-2023-43339-CMSmadesimple-Reflected-XSS---Installation/blob/main/README.md), [https://github.com/sromanhu/Cmsmadesimple-CMS-Stored-XSS/blob/main/README.md](https://github.com/sromanhu/Cmsmadesimple-CMS-Stored-XSS/blob/main/README.md).