First published: Fri Aug 16 2024(Updated: )
A Cross-site Scripting (XSS) vulnerability exists in version v2024-01-05 of the indexmenu plugin when is used and enabled in Dokuwiki (Open Source Wiki Engine). A malicious attacker can input XSS payloads for example when creating or editing existing page, to trigger the XSS on Dokuwiki, which is then stored in .txt file (due to nature of how Dokuwiki is designed), which presents stored XSS.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dokuwiki indexmenu plugin | ||
DokuWiki |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-42758 is categorized as a Cross-site Scripting (XSS) vulnerability, which can be severe depending on the context of its exploit.
To fix CVE-2024-42758, update the indexmenu plugin to the latest version that addresses this vulnerability.
CVE-2024-42758 affects users of the Dokuwiki indexmenu plugin when it is used and enabled in Dokuwiki.
An attacker can execute Cross-site Scripting (XSS) payloads to manipulate users' interactions within Dokuwiki.
CVE-2024-42758 was disclosed on January 5, 2024.