header-logo
Suggest Exploit
vendor:
wsCMS
by:
5.5
CVSS
MEDIUM
Cross-Site Scripting
79
CWE
Product Name: wsCMS
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

Cross-Site Scripting in wsCMS

The wsCMS application fails to properly sanitize user-supplied input before using it in dynamically generated content. This allows an attacker to execute arbitrary script code in the browser of an unsuspecting user, potentially leading to the theft of authentication credentials and other attacks.

Mitigation:

To mitigate this vulnerability, it is recommended to properly sanitize user input before using it in dynamically generated content. Input validation and output encoding techniques should be implemented to prevent the execution of malicious scripts.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/40447/info

wsCMS is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.

An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.

http://www.example.com/news.php?id=<script><font color=red size=15>XSS</font></script>