Submit #466396: Redaxo CMS 5.18.1 Cross Site Scripting
| Title | Redaxo CMS 5.18.1 Cross Site Scripting |
|---|---|
| Description | Stored XSS on REDAXO 5.18.1 - Article / "content/edit" On the latest version of Redaxo, v5.18.1, the article name field is susceptible to stored XSS. If a user creates an article name (ie /redaxo/index.php?page=structure&category_id=1&article_id=1&clang=1&function=edit_art&artstart=0) using a xss payload such as "<BODY ONLOAD=alert('XSS!')>", the XSS executes. A malicious actor can easily steal cookie using this stored XSS and perform a session hijacking attack. I have emailed in to the vendor at [email protected] and created a github advisory but did not get a response from either channels. Given that this is a popular CMS, it would be good to have a CVE out to inform users. |
| Source | ⚠️ https:/ |
| User | geochen (UID 78995) |
| Submission | 12/19/2024 11:12 AM (1 Year ago) |
| Moderation | 01/08/2025 05:45 PM (20 days later) |
| Status | Accepted |
| VulDB entry | 290814 [Redaxo CMS 5.18.1 Structure Management Page Article Name cross site scripting] |
| Points | 17 |