First published: Wed Nov 13 2024(Updated: )
A vulnerability was found in Public CMS 5.202406.d and classified as problematic. This issue affects some unknown processing of the file /admin/cmsVote/save of the component Voting Management. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The patch is named b9530b9cc1f5cfdad4b637874f59029a6283a65c. It is recommended to apply a patch to fix this issue.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
sanluan PublicCMS | =5.202406.d |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-11175 is classified as a problematic vulnerability affecting Public CMS version 5.202406.d.
CVE-2024-11175 allows for cross-site scripting through the manipulation of the /admin/cmsVote/save file in the Voting Management component.
Yes, CVE-2024-11175 can be exploited remotely, making it a significant security concern.
Exploitation of CVE-2024-11175 may allow attackers to execute arbitrary scripts in the context of a user's session.
To mitigate CVE-2024-11175, it is recommended to update Public CMS to the latest version where the vulnerability is patched.