Erxes, an experience operating system (XOS) with a set of plugins, is vulnerable to cross-site scripting in versions 0.22.3 and prior. This results in client-side code execution. The victim must follow a malicious link or be redirected there from malicious web site. There are no known patches.
References
Link | Resource |
---|---|
https://github.com/erxes/erxes/blob/f131b49add72032650d483f044d00658908aaf4a/widgets/server/views/widget.ejs#L14 | Exploit Issue Tracking |
https://github.com/erxes/erxes/blob/f131b49add72032650d483f044d00658908aaf4a/widgets/server/index.ts#L54 | Exploit Issue Tracking |
https://securitylab.github.com/advisories/GHSL-2021-103-erxes/ | Exploit Third Party Advisory |
Configurations
Information
Published : 2023-02-20 15:15
Updated : 2023-03-02 07:56
NVD link : CVE-2021-32853
Mitre link : CVE-2021-32853
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
erxes
- erxes