Persistent XSS Vulnerability in WUZHI CMS 4.1.0
CVE-2018-10313

5.4MEDIUM

Key Information:

Vendor

Wuzhicms

Status
Vendor
CVE Published:
24 April 2018

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2018-10313?

The WUZHI CMS version 4.1.0 is vulnerable to persistent Cross-Site Scripting (XSS) attacks. This security flaw arises from inadequate input validation in the 'form%5Bqq_10%5D' parameter when accessed through the URI /index.php?m=member&f=index&v=profile&set_iframe=1. Attackers can exploit this vulnerability to inject malicious scripts into web pages viewed by users, potentially compromising user data and leading to further attacks. It is crucial for administrators to ensure proper sanitization of user inputs to mitigate the risk.

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.