In MODX Revolution before 2.5.7, a user with resource edit permissions can inject an XSS payload into the title of any post via the pagetitle parameter to connectors/index.php.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://citadelo.com/en/2017/04/modx-revolution-cms/ | exploit third party advisory patch |
https://github.com/modxcms/revolution/pull/13415 | patch vendor advisory |