First published: Mon Nov 11 2024(Updated: )
A vulnerability, which was classified as problematic, has been found in Sanluan PublicCMS 5.202406.d. This issue affects some unknown processing of the file /admin/cmsTagType/save of the component Tag Type Handler. The manipulation of the argument name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
sanluan PublicCMS | =5.202406.d |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-11070 has been classified as problematic, indicating a significant risk to affected systems.
To remediate CVE-2024-11070, it's crucial to update Sanluan PublicCMS to the latest version that addresses this vulnerability.
CVE-2024-11070 specifically affects Sanluan PublicCMS version 5.202406.d.
CVE-2024-11070 is a cross-site scripting (XSS) vulnerability caused by improper handling of user input in the Tag Type Handler.
The vulnerability CVE-2024-11070 involves the /admin/cmsTagType/save file within the Tag Type Handler component.