XSS exists in WUZHI CMS 4.1.0 via index.php?m=core&f=map&v=baidumap&x=[XSS]&y=[XSS] to coreframe/app/core/map.php.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/wuzhicms/wuzhicms/issues/171 | issue tracking exploit third party advisory |
https://gist.github.com/redeye5/ebfef23f0a063b82779151f9cde8e480 | third party advisory exploit |