Vulnerability Description
Archer Platform 6.x before 6.13 P2 (6.13.0.2) contains an authenticated HTML content injection vulnerability. A remote authenticated malicious Archer user could potentially exploit this to store malicious HTML code in a trusted application data store. When victim users access the data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable application. 6.14 (6.14.0) is also a fixed release.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Archerirm | Archer | >= 6.0.0, < 6.14.0 |
Related Weaknesses (CWE)
References
- https://www.archerirm.community/t5/platform-announcements/archer-update-for-multVendor Advisory
- https://www.archerirm.community/t5/platform-announcements/archer-update-for-multVendor Advisory
FAQ
What is CVE-2023-48642?
CVE-2023-48642 is a vulnerability with a CVSS score of 5.4 (MEDIUM). Archer Platform 6.x before 6.13 P2 (6.13.0.2) contains an authenticated HTML content injection vulnerability. A remote authenticated malicious Archer user could potentially exploit this to store malic...
How severe is CVE-2023-48642?
CVE-2023-48642 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-48642?
Check the references section above for vendor advisories and patch information. Affected products include: Archerirm Archer.