3.5
CVSSv2

CVE-2022-24585

Published: 15/02/2022 Updated: 22/02/2022
CVSS v2 Base Score: 3.5 | Impact Score: 2.9 | Exploitability Score: 6.8
CVSS v3 Base Score: 5.4 | Impact Score: 2.7 | Exploitability Score: 2.3
VMScore: 312
Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N

Vulnerability Summary

A stored cross-site scripting (XSS) vulnerability in the component /core/admin/comment.php of PluXml v5.8.7 allows malicious users to execute arbitrary web scripts or HTML via a crafted payload in the author parameter.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

pluxml pluxml 5.8.7

Vendor Advisories

Debian Bug report logs - #1008264 Multiple security issues Package: src:pluxml; Maintainer for src:pluxml is Tanguy Ortolo <tanguy+debian@ortoloeu>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Fri, 25 Mar 2022 16:33:02 UTC Severity: grave Tags: security, upstream Found in version pluxml/56-1 Reply ...