In MODX Revolution before 2.5.7, an attacker is able to trigger Reflected XSS by injecting payloads into several fields on the setup page, as demonstrated by the database_type parameter.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://citadelo.com/en/2017/04/modx-revolution-cms/ | exploit third party advisory patch |
https://github.com/modxcms/revolution/pull/13424 |