Vulnerability Description
In RPCMS v1.8 and below, the "nickname" variable is not properly sanitized before being displayed on page. When the API functions are enabled, the attacker can use API to update user nickname with XSS payload and achieve stored XSS. Users who view the articles published by the injected user will trigger the XSS.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rpcms | Rpcms | <= 1.8 |
Related Weaknesses (CWE)
References
- https://gist.github.com/victomteng1997/bfa1e0e07dd22f7e0b13256eda79626fExploitThird Party Advisory
- https://github.com/ralap-z/RPCMS/Product
- https://gist.github.com/victomteng1997/bfa1e0e07dd22f7e0b13256eda79626fExploitThird Party Advisory
- https://github.com/ralap-z/RPCMS/Product
FAQ
What is CVE-2021-37392?
CVE-2021-37392 is a vulnerability with a CVSS score of 5.4 (MEDIUM). In RPCMS v1.8 and below, the "nickname" variable is not properly sanitized before being displayed on page. When the API functions are enabled, the attacker can use API to update user nickname with XSS...
How severe is CVE-2021-37392?
CVE-2021-37392 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-37392?
Check the references section above for vendor advisories and patch information. Affected products include: Rpcms Rpcms.