A vulnerability was found in alwindoss akademy up to 35caccea888ed63d5489e211c99edff1f62efdba. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file cmd/akademy/handler/handlers.go. The manipulation of the argument emailAddress leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://vuldb.com/?id.276487 | third party advisory vdb entry exploit permissions required technical description |
https://vuldb.com/?ctiid.276487 | exploit signature third party advisory issue tracking permissions required |
https://vuldb.com/?submit.397340 | third party advisory vdb entry |
https://github.com/alwindoss/akademy/issues/1 | issue tracking exploit |