In XenForo through 2.2.7, a threat actor with access to the admin panel can create a new Advertisement via the Advertising function, and save an XSS payload in the body of the HTML document. This payload will execute globally on the client side.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://xenforo.com/community/forums/announcements/ | release notes vendor advisory |
https://github.com/SakuraSamuraii/CVE-2021-43032 | third party advisory exploit |