First published: Sat Sep 16 2023(Updated: )
A vulnerability has been found in Pluck CMS 4.7.18 and classified as problematic. This vulnerability affects unknown code of the file install.php of the component Installation Handler. The manipulation of the argument contents with the input <script>alert('xss')</script> leads to cross site scripting. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. VDB-239854 is the identifier assigned to this vulnerability.
Credit: cna@vuldb.com cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pluck CMS | =4.7.18 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-5013 is medium.
CVE-2023-5013 affects Pluck CMS 4.7.18 by allowing cross-site scripting (XSS) attacks.
To fix CVE-2023-5013 in Pluck CMS 4.7.18, update to a patched version of the software as soon as it becomes available.
The Common Weakness Enumeration (CWE) ID for CVE-2023-5013 is CWE-79 (Cross-Site Scripting).
You can find more information about CVE-2023-5013 at the following references: [GitHub](https://github.com/Jacky-Y/vuls/blob/main/vul3.md) and [VulDB](https://vuldb.com/?id.239854).