Vulnerability Description
A reflected cross-site scripting (XSS) vulnerability in the Community Edition version 9.0 of OS4ED's openSIS Classic allows remote attackers to execute arbitrary JavaScript in the web browser of a user, by including a malicious payload into the 'include' parameter in 'ForExport.php'
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Os4Ed | Opensis | 9.0 |
Related Weaknesses (CWE)
References
- https://github.com/OS4ED/openSIS-ClassicRelease Notes
- https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38882Vendor Advisory
- https://www.os4ed.com/Product
- https://github.com/OS4ED/openSIS-ClassicRelease Notes
- https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38882Vendor Advisory
- https://www.os4ed.com/Product
FAQ
What is CVE-2023-38882?
CVE-2023-38882 is a vulnerability with a CVSS score of 6.1 (MEDIUM). A reflected cross-site scripting (XSS) vulnerability in the Community Edition version 9.0 of OS4ED's openSIS Classic allows remote attackers to execute arbitrary JavaScript in the web browser of a use...
How severe is CVE-2023-38882?
CVE-2023-38882 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-38882?
Check the references section above for vendor advisories and patch information. Affected products include: Os4Ed Opensis.