First published: Wed Apr 03 2024(Updated: )
In VeridiumID before 3.5.0, a stored cross-site scripting (XSS) vulnerability has been discovered in the admin portal that allows an authenticated attacker to take over all accounts by sending malicious input via the self-service portal.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VeridiumID | <3.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-45552 is considered a high severity vulnerability due to its potential for account takeover via stored cross-site scripting.
To fix CVE-2023-45552, upgrade VeridiumID to version 3.5.0 or later to patch the vulnerability.
Any users of VeridiumID versions prior to 3.5.0 are affected by CVE-2023-45552.
CVE-2023-45552 is associated with a stored cross-site scripting (XSS) attack.
Yes, an authenticated attacker is required to exploit CVE-2023-45552 through the admin portal.