Vulnerability Description
Stored XSS in b2evolution CMS version 6.11.6 and prior allows an attacker to perform malicious JavaScript code execution via the plugin name input field in the plugin module.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| B2Evolution | B2Evolution | < 6.11.6 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/161363/b2evolution-CMS-6.11.6-Cross-Site-ScExploitThird Party AdvisoryVDB Entry
- https://github.com/b2evolution/b2evolution/issues/102Third Party Advisory
- https://www.exploit-db.com/exploits/49551ExploitThird Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/161363/b2evolution-CMS-6.11.6-Cross-Site-ScExploitThird Party AdvisoryVDB Entry
- https://github.com/b2evolution/b2evolution/issues/102Third Party Advisory
- https://www.exploit-db.com/exploits/49551ExploitThird Party AdvisoryVDB Entry
FAQ
What is CVE-2020-22841?
CVE-2020-22841 is a vulnerability with a CVSS score of 4.8 (MEDIUM). Stored XSS in b2evolution CMS version 6.11.6 and prior allows an attacker to perform malicious JavaScript code execution via the plugin name input field in the plugin module.
How severe is CVE-2020-22841?
CVE-2020-22841 has been rated MEDIUM with a CVSS base score of 4.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-22841?
Check the references section above for vendor advisories and patch information. Affected products include: B2Evolution B2Evolution.