WUZHI CMS 4.1.0 allows persistent XSS via the form%5Bqq_10%5D parameter to the /index.php?m=member&f=index&v=profile&set_iframe=1 URI.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://www.exploit-db.com/exploits/44617/ | third party advisory vdb entry exploit |
https://github.com/wuzhicms/wuzhicms/issues/133 | third party advisory exploit |