Vulnerability Description
A vulnerability classified as problematic was found in SourceCodester Simple Sales Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /ci_ssms/index.php/orders/create. The manipulation of the argument customer_name with the input <script>alert("XSS")</script> leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Simple Sales Management System Project | Simple Sales Management System | 1.0 |
Related Weaknesses (CWE)
References
- https://github.com/CyberThoth/CVE/blob/a203e5c7b3ac88a5a0bc7200324f2b24716e8fc2/
- https://vuldb.com/?id.203167ExploitThird Party Advisory
- https://github.com/CyberThoth/CVE/blob/a203e5c7b3ac88a5a0bc7200324f2b24716e8fc2/
- https://vuldb.com/?id.203167ExploitThird Party Advisory
FAQ
What is CVE-2022-2293?
CVE-2022-2293 is a vulnerability with a CVSS score of 3.5 (LOW). A vulnerability classified as problematic was found in SourceCodester Simple Sales Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /ci_ssms/index.php/orde...
How severe is CVE-2022-2293?
CVE-2022-2293 has been rated LOW with a CVSS base score of 3.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-2293?
Check the references section above for vendor advisories and patch information. Affected products include: Simple Sales Management System Project Simple Sales Management System.