Vulnerability Description
Lack of "current" GET parameter validation during the action of changing a language leads to an open redirect vulnerability.
CVSS Score
6.1
MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tasmoadmin | Tasmoadmin | < 3.3.0 |
Related Weaknesses (CWE)
References
- https://cert.pl/en/posts/2024/01/CVE-2023-6552/Third Party Advisory
- https://cert.pl/posts/2024/01/CVE-2023-6552/Third Party Advisory
- https://github.com/TasmoAdmin/TasmoAdmin/pull/1039Patch
- https://cert.pl/en/posts/2024/01/CVE-2023-6552/Third Party Advisory
- https://cert.pl/posts/2024/01/CVE-2023-6552/Third Party Advisory
- https://github.com/TasmoAdmin/TasmoAdmin/pull/1039Patch
FAQ
What is CVE-2023-6552?
CVE-2023-6552 is a vulnerability with a CVSS score of 6.1 (MEDIUM). Lack of "current" GET parameter validation during the action of changing a language leads to an open redirect vulnerability.
How severe is CVE-2023-6552?
CVE-2023-6552 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-6552?
Check the references section above for vendor advisories and patch information. Affected products include: Tasmoadmin Tasmoadmin.