First published: Fri Aug 16 2024(Updated: )
A stored cross-site scripting (XSS) vulnerability exists in ZZCMS2023 in the ask/show.php file at line 21. An attacker can exploit this vulnerability by sending a specially crafted POST request to /user/ask_edit.php?action=add, which includes malicious JavaScript code in the 'content' parameter. When a user visits the ask/show_{newsid}.html page, the injected script is executed in the context of the user's browser, leading to potential theft of cookies, session tokens, or other sensitive information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ZZCMS | =2023 | |
ZZCMS ZZCMS2023 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-43006 is classified as a stored cross-site scripting (XSS) vulnerability.
To fix CVE-2024-43006, ensure to validate and sanitize all user input before processing, specifically in the 'content' parameter.
CVE-2024-43006 affects ZZCMS version 2023.
CVE-2024-43006 can be exploited by sending a malicious POST request to /user/ask_edit.php?action=add that includes JavaScript in the 'content' parameter.
The consequences of CVE-2024-43006 may include unauthorized script execution in the context of a user's browser.