Eyoucms 1.5.4 lacks sanitization of input data, allowing an attacker to inject malicious code into `filename` param to trigger Reflected XSS.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/eyoucms/eyoucms/releases/tag/v1.5.4 | third party advisory |
https://github.com/KietNA-HPT/CVE | third party advisory exploit |