First published: Wed Jan 22 2025(Updated: )
Stored Cross-Site Scripting (XSS) Vulnerability in the Categorization Option of My Subscriptions Functionality in Silverpeas Core 6.3.1 <= 6.4.1 allows a remote attacker to execute arbitrary JavaScript code. This is achieved by injecting a malicious payload into the Name field of a subscription. The attack can lead to session hijacking, data theft, or unauthorized actions when an admin user views the affected subscription.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Silverpeas Core | ||
maven/org.silverpeas.core:silverpeas-core | >=6.3.1<6.4.2 | 6.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-56923 is classified as a stored cross-site scripting (XSS) vulnerability, which can have a significant impact on security.
To remediate CVE-2024-56923, upgrade Silverpeas Core to version 6.4.2 or later.
CVE-2024-56923 is caused by the ability to inject malicious JavaScript code through the Name field in the My Subscriptions functionality.
CVE-2024-56923 affects all versions of Silverpeas Core from 6.3.1 up to and including 6.4.1.
An attacker exploiting CVE-2024-56923 can execute arbitrary JavaScript code in the context of the user's browser.