Reflected XSS in forkcms/forkcms
Valid
Reported on
Mar 11th 2022
Description
Privacy Consent in ForkCMS (v 5.11.0) Setting unsanitized user input resulting in Reflected XSS.
Proof of Concept
Endpoint
- http://IP/private/en/settings/index
Step
- Login to ForkCMS
- Go to Settings -> General
- Insert payload on "Technical Name" user input at "Privacy Consent" panel
Payload
- "><script>alert("reflected-xss")</script>
POC pic
Impact
This vulnerability is capable of executing a malicious javascript code in web page.
We are processing your report and will contact the
forkcms
team within 24 hours.
a year ago
We have contacted a member of the
forkcms
team and are waiting to hear back
a year ago
We have sent a
follow up to the
forkcms
team.
We will try again in 7 days.
a year ago
din modified the report
a year ago
We have sent a
second
follow up to the
forkcms
team.
We will try again in 10 days.
a year ago
Jelmer Prins modified the report
a year ago
We have sent a
fix follow up to the
forkcms
team.
We will try again in 7 days.
a year ago
to join this conversation