Vulnerability Description
Xibo is a content management system (CMS). An SQL injection vulnerability was discovered in the `report/data/proofofplayReport` API route inside the CMS. This allows an authenticated user to to obtain and modify arbitrary data from the Xibo database by injecting specially crafted values in to the `sortBy` parameter. Users should upgrade to version 3.3.12 or 4.0.14 which fix this issue.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://github.com/xibosignage/xibo-cms/commit/c60cfd8727da77b9db10297148eadd697
- https://github.com/xibosignage/xibo-cms/security/advisories/GHSA-v6q4-h869-gm3r
- https://xibosignage.com/blog/security-advisory-2024-07
- https://github.com/xibosignage/xibo-cms/commit/c60cfd8727da77b9db10297148eadd697
- https://github.com/xibosignage/xibo-cms/security/advisories/GHSA-v6q4-h869-gm3r
- https://xibosignage.com/blog/security-advisory-2024-07
FAQ
What is CVE-2024-41944?
CVE-2024-41944 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Xibo is a content management system (CMS). An SQL injection vulnerability was discovered in the `report/data/proofofplayReport` API route inside the CMS. This allows an authenticated user to to obtain...
How severe is CVE-2024-41944?
CVE-2024-41944 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-41944?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.