Vulnerability Description
A reflected cross-site scripting (XSS) vulnerability in OpenKnowledgeMaps Head Start versions 4, 5, 6, 7 as well as Visual Project Explorer 1.0, allows remote attackers to execute arbitrary JavaScript in the web browser of a user, by including a malicious payload into the 'service' parameter in 'headstart_snapshot.php'.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openknowledgemaps | Head Start | 4 |
Related Weaknesses (CWE)
References
- https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-40618ExploitThird Party Advisory
- https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-40618ExploitThird Party Advisory
FAQ
What is CVE-2023-40618?
CVE-2023-40618 is a vulnerability with a CVSS score of 6.1 (MEDIUM). A reflected cross-site scripting (XSS) vulnerability in OpenKnowledgeMaps Head Start versions 4, 5, 6, 7 as well as Visual Project Explorer 1.0, allows remote attackers to execute arbitrary JavaScript...
How severe is CVE-2023-40618?
CVE-2023-40618 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-40618?
Check the references section above for vendor advisories and patch information. Affected products include: Openknowledgemaps Head Start.