Vulnerability Description
In Factor (App Framework & Headless CMS) forum plugin, versions 1.3.5 to 1.8.30, are vulnerable to reflected Cross-Site Scripting (XSS) at the “search” parameter in the URL. An unauthenticated attacker can execute malicious JavaScript code and steal the session cookies.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Darwin | Factor | >= 1.3.5, <= 1.8.30 |
Related Weaknesses (CWE)
References
- https://github.com/FactorJS/factor/blob/v1.8.30/%40plugins/plugin-forum/topic-li
- https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25982Third Party Advisory
- https://github.com/FactorJS/factor/blob/v1.8.30/%40plugins/plugin-forum/topic-li
- https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25982Third Party Advisory
FAQ
What is CVE-2021-25982?
CVE-2021-25982 is a vulnerability with a CVSS score of 6.1 (MEDIUM). In Factor (App Framework & Headless CMS) forum plugin, versions 1.3.5 to 1.8.30, are vulnerable to reflected Cross-Site Scripting (XSS) at the “search” parameter in the URL. An unauthenticated attacke...
How severe is CVE-2021-25982?
CVE-2021-25982 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-25982?
Check the references section above for vendor advisories and patch information. Affected products include: Darwin Factor.