Vulnerability Description
A vulnerability classified as problematic was found in Gila CMS 1.10.9. This vulnerability affects unknown code of the file /cm/update_rows/page?id=2 of the component HTTP POST Request Handler. The manipulation of the argument content leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gilacms | Gila Cms | 1.10.9 |
Related Weaknesses (CWE)
References
- https://vuldb.com/?ctiid.274114Permissions RequiredVDB Entry
- https://vuldb.com/?id.274114Permissions RequiredThird Party AdvisoryVDB Entry
- https://vuldb.com/?submit.384630Third Party AdvisoryVDB Entry
FAQ
What is CVE-2024-7657?
CVE-2024-7657 is a vulnerability with a CVSS score of 3.5 (LOW). A vulnerability classified as problematic was found in Gila CMS 1.10.9. This vulnerability affects unknown code of the file /cm/update_rows/page?id=2 of the component HTTP POST Request Handler. The ma...
How severe is CVE-2024-7657?
CVE-2024-7657 has been rated LOW with a CVSS base score of 3.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-7657?
Check the references section above for vendor advisories and patch information. Affected products include: Gilacms Gila Cms.