A vulnerability, which was classified as problematic, was found in q2apro q2apro-on-site-notifications up to 1.4.6. This affects the function process_request of the file q2apro-onsitenotifications-page.php. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.4.8 is able to address this issue. The patch is named 0ca85ca02f8aceb661e9b71fd229c45d388ea5b5. It is recommended to upgrade the affected component.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://vuldb.com/?id.307479 | vdb entry technical description |
https://vuldb.com/?ctiid.307479 | signature permissions required |
https://vuldb.com/?submit.564749 | third party advisory |
https://github.com/q2apro/q2apro-on-site-notifications/issues/43 | issue tracking |
https://github.com/q2apro/q2apro-on-site-notifications/issues/43#issuecomment-1694357344 | issue tracking |
https://github.com/q2apro/q2apro-on-site-notifications/commit/0ca85ca02f8aceb661e9b71fd229c45d388ea5b5 | patch |