Vulnerability Description
In Factor (App Framework & Headless CMS) forum plugin, versions v1.3.8 to v1.8.30, are vulnerable to reflected Cross-Site Scripting (XSS) at the “tags” and “category” parameters in the URL. An unauthenticated attacker can execute malicious JavaScript code and steal the session cookies.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Darwin | Factor | >= 1.3.8, <= 1.8.30 |
Related Weaknesses (CWE)
References
- https://github.com/FactorJS/factor/blob/v1.8.30/%40plugins/plugin-forum/topic-li
- https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25983Third Party Advisory
- https://github.com/FactorJS/factor/blob/v1.8.30/%40plugins/plugin-forum/topic-li
- https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25983Third Party Advisory
FAQ
What is CVE-2021-25983?
CVE-2021-25983 is a vulnerability with a CVSS score of 6.1 (MEDIUM). In Factor (App Framework & Headless CMS) forum plugin, versions v1.3.8 to v1.8.30, are vulnerable to reflected Cross-Site Scripting (XSS) at the “tags” and “category” parameters in the URL. An unauthe...
How severe is CVE-2021-25983?
CVE-2021-25983 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-25983?
Check the references section above for vendor advisories and patch information. Affected products include: Darwin Factor.