First published: Thu Dec 14 2023(Updated: )
In WhatsUp Gold versions released before 2023.1, a stored cross-site scripting (XSS) vulnerability has been identified. It is possible for an attacker to craft a XSS payload and store that value within a device group. If a WhatsUp Gold user interacts with the crafted payload, the attacker would be able to execute malicious JavaScript within the context of the victims browser.
Credit: security@progress.com
Affected Software | Affected Version | How to fix |
---|---|---|
Progress Software WhatsUp Gold | <23.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6365 is classified as a medium severity stored cross-site scripting (XSS) vulnerability.
To mitigate CVE-2023-6365, users should upgrade to WhatsUp Gold version 2023.1 or later.
CVE-2023-6365 allows attackers to inject malicious scripts, potentially compromising user data and session security.
Only versions of WhatsUp Gold released before 2023.1 are susceptible to CVE-2023-6365.
CVE-2023-6365 was identified as a security issue in WhatsUp Gold by the Progress Software security team.