vendor:
PlumeCMS
by:
Ivano Binetti
7.5
CVSS
HIGH
Multiple Persistent XSS
79
CWE
Product Name: PlumeCMS
Affected Version From: 1
Affected Version To: 1.2.2004
Patch Exists: YES
Related CWE: CVE-2012-2156
CPE: a:plumecms:plumecms:1.2.4
Platforms Tested: Debian Squeeze (6.0)
2012
PlumeCMS <= 1.2.4 Multiple Persistent XSS
PlumeCMS 1.2.4 (and below) is prone to multiple persistent XSS vulnerability due to an improper input sanitization of multiple parameters. The 'u_email' parameter and 'u_realname' parameter are not correctly sanitized before being passed to the server-side script 'manager/users.php' via HTTP POST method. An attacker who is able to change his profile settings could insert malicious code into the 'Email' field within the 'Authors' template, creating a persistent XSS vulnerability for all users/admins who access the Plume's management interface.
Mitigation:
To mitigate this vulnerability, it is recommended to properly sanitize user input before using it in server-side scripts. Additionally, implementing content security policies and input validation can help prevent XSS attacks.