Vulnerability Description
Exponent CMS 2.6.0patch2 allows an authenticated user to inject persistent JavaScript code on the "User-Agent" header when logging in. When an administrator user visits the "User Sessions" tab, the JavaScript will be triggered allowing an attacker to compromise the administrator session.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Exponentcms | Exponent Cms | 2.6.0 |
Related Weaknesses (CWE)
References
- https://exponentcms.lighthouseapp.com/projects/61783/tickets/1461ExploitIssue TrackingVendor Advisory
- https://fluidattacks.com/advisories/cobain/ExploitIssue TrackingThird Party Advisory
- https://github.com/exponentcms/exponent-cms/issues/1546ExploitIssue TrackingThird Party Advisory
- https://exponentcms.lighthouseapp.com/projects/61783/tickets/1461ExploitIssue TrackingVendor Advisory
- https://fluidattacks.com/advisories/cobain/ExploitIssue TrackingThird Party Advisory
- https://github.com/exponentcms/exponent-cms/issues/1546ExploitIssue TrackingThird Party Advisory
FAQ
What is CVE-2022-23049?
CVE-2022-23049 is a vulnerability with a CVSS score of 5.4 (MEDIUM). Exponent CMS 2.6.0patch2 allows an authenticated user to inject persistent JavaScript code on the "User-Agent" header when logging in. When an administrator user visits the "User Sessions" tab, the Ja...
How severe is CVE-2022-23049?
CVE-2022-23049 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-23049?
Check the references section above for vendor advisories and patch information. Affected products include: Exponentcms Exponent Cms.