First published: Tue Apr 30 2024(Updated: )
A stored cross-site scripting (XSS) vulnerability in the component /action/anti.php of ThinkSAAS v3.7.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the word parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Thinksaas | ||
Thinksaas | =3.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-33101 is classified as a high severity vulnerability due to its potential for stored cross-site scripting (XSS) attacks.
To fix CVE-2024-33101, sanitize and validate user inputs for the word parameter in the /action/anti.php component.
CVE-2024-33101 allows attackers to execute arbitrary scripts, which can lead to session hijacking, data theft, or site defacement.
CVE-2024-33101 affects users running ThinkSAAS version 3.7.0 and below.
You can detect CVE-2024-33101 by reviewing logs for unusual behavior related to the /action/anti.php component and performing security scans focused on XSS vulnerabilities.