Vulnerability Description
A stored cross-site scripting (XSS) vulnerability in the component \affiche\admin\index.php of WUZHICMS v4.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the $formdata parameter.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wuzhicms | Wuzhicms | 4.1.0 |
Related Weaknesses (CWE)
References
- http://wuzhicms.comProduct
- https://github.com/majic-banana/vulnerability/blob/main/POC/WUZHICMS4.1.0%20StorExploitThird Party Advisory
- https://github.com/wuzhicms/wuzhicmsProduct
- http://wuzhicms.comProduct
- https://github.com/majic-banana/vulnerability/blob/main/POC/WUZHICMS4.1.0%20StorExploitThird Party Advisory
- https://github.com/wuzhicms/wuzhicmsProduct
FAQ
What is CVE-2024-32206?
CVE-2024-32206 is a vulnerability with a CVSS score of 4.6 (MEDIUM). A stored cross-site scripting (XSS) vulnerability in the component \affiche\admin\index.php of WUZHICMS v4.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected ...
How severe is CVE-2024-32206?
CVE-2024-32206 has been rated MEDIUM with a CVSS base score of 4.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-32206?
Check the references section above for vendor advisories and patch information. Affected products include: Wuzhicms Wuzhicms.