An XSS vulnerability exists in WUZHI CMS 4.1.0. There is persistent XSS that allows remote malicious users to inject arbitrary web script or HTML via the form[nickname] parameter to the index.php?m=core&f=set&v=sendmail URI. When the administrator accesses the "system settings - mail server" screen, the XSS payload is triggered.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
wuzhicms wuzhi cms 4.1.0 |