Multiple cross-site scripting (XSS) vulnerabilities in pragmaMx 1.x before 1.12.2 allow remote attackers to inject arbitrary web script or HTML via the (1) name parameter to modules.php or (2) img_url to includes/wysiwyg/spaw/editor/plugins/imgpopup/img_popup.php.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://www.htbridge.com/advisory/HTB23090 | third party advisory exploit |
http://www.pragmamx.org/Forum-topic-33554.html | vendor advisory issue tracking |
http://www.pragmamx.org/News-pragmaMx-1.12-Servicepack2-item-706.html | vendor advisory |