Vulnerability Description
Genesys Administrator Extension (GAX) before 9.0.105.15 is vulnerable to Cross Site Scripting (XSS) via the Business Structure page of the iWD plugin, aka GAX-11261.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Genesys | Administrator Extension | < 9.0.105.15 |
| Linux | Linux Kernel | - |
| Microsoft | Windows | - |
Related Weaknesses (CWE)
References
- https://docs.genesys.com/Documentation/RN/9.0.x/gax90rn/gax9010515Vendor Advisory
- https://docs.genesys.com/Documentation/RN/9.0.x/gax90rn/gax9010515Vendor Advisory
FAQ
What is CVE-2023-23208?
CVE-2023-23208 is a vulnerability with a CVSS score of 6.1 (MEDIUM). Genesys Administrator Extension (GAX) before 9.0.105.15 is vulnerable to Cross Site Scripting (XSS) via the Business Structure page of the iWD plugin, aka GAX-11261.
How severe is CVE-2023-23208?
CVE-2023-23208 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-23208?
Check the references section above for vendor advisories and patch information. Affected products include: Genesys Administrator Extension, Linux Linux Kernel, Microsoft Windows.