Vulnerability Description
A prototype pollution vulnerability exists in Strikingly CMS which can result in reflected cross-site scripting (XSS) in affected applications and sites built with Strikingly. The vulnerability exists because of Strikingly JavaScript library parsing the URL fragment allows access to the __proto__ or constructor properties and the Object prototype. By leveraging an embedded gadget like jQuery, an attacker who convinces a victim to visit a specially crafted link could achieve arbitrary javascript execution in the context of the user's browser.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Strikingly | Strikingly | All versions |
Related Weaknesses (CWE)
References
- https://www.tenable.com/security/research/tra-2023-18ExploitThird Party Advisory
- https://www.tenable.com/security/research/tra-2023-18ExploitThird Party Advisory
FAQ
What is CVE-2023-2582?
CVE-2023-2582 is a vulnerability with a CVSS score of 6.1 (MEDIUM). A prototype pollution vulnerability exists in Strikingly CMS which can result in reflected cross-site scripting (XSS) in affected applications and sites built with Strikingly. The vulnerability exists...
How severe is CVE-2023-2582?
CVE-2023-2582 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-2582?
Check the references section above for vendor advisories and patch information. Affected products include: Strikingly Strikingly.