3.5
CVSSv2

CVE-2021-38603

Published: 12/08/2021 Updated: 16/08/2021
CVSS v2 Base Score: 3.5 | Impact Score: 2.9 | Exploitability Score: 6.8
CVSS v3 Base Score: 4.8 | Impact Score: 2.7 | Exploitability Score: 1.7
VMScore: 312
Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N

Vulnerability Summary

PluXML 5.8.7 allows core/admin/profil.php stored XSS via the Information field.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

pluxml pluxml 5.8.7

Vendor Advisories

Debian Bug report logs - #1008264 Multiple security issues Package: src:pluxml; Maintainer for src:pluxml is Tanguy Ortolo <tanguy+debian@ortoloeu>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Fri, 25 Mar 2022 16:33:02 UTC Severity: grave Tags: security, upstream Found in version pluxml/56-1 Reply ...

Exploits

PluXML version 587 suffers from a persistent cross site scripting vulnerability ...

Github Repositories

CVE-2021-38603 A stored cross site scripting vulnerability is present on the Profile edit page in the Information: field for each user <hostname/server ip>/core/admin/profilphp Vulnerable Fields: Information: Once inserted, XSS can be triggered by visiting any page/article created by that particular user