baserCMS before version 4.4.1 is vulnerable to Cross-Site Scripting. Arbitrary JavaScript may be executed by entering a crafted nickname in blog comments. The issue affects the blog comment component. It is fixed in version 4.4.1.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://basercms.net/security/20201029 | vendor advisory |
https://github.com/baserproject/basercms/security/advisories/GHSA-fw5q-j9p4-3vxg | third party advisory patch |
https://github.com/baserproject/basercms/commit/d14f506385f21d67d5ff3462f204d4c2321b7c54 | third party advisory patch |