First published: Mon Jan 27 2025(Updated: )
A cross-site scripting (XSS) vulnerability in the Product module of Dolibarr v21.0.0-beta allows attackers to execute arbitrary web scripts or HTMl via a crafted payload injected into the Title parameter.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/dolibarr/dolibarr | =21.0.0-beta | |
Dolibarr ERP & CRM | =21.0.0-beta | |
Dolibarr |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-55228 is classified as a cross-site scripting (XSS) vulnerability, which can allow attackers to execute arbitrary scripts.
To fix CVE-2024-55228, ensure you are using a patched version of Dolibarr that addresses this vulnerability.
CVE-2024-55228 specifically affects Dolibarr version 21.0.0-beta.
By exploiting CVE-2024-55228, attackers can execute arbitrary web scripts or HTML in the context of a victim's browser.
Yes, CVE-2024-55228 indicates a failure in user input validation related to the Title parameter in Dolibarr.