vendor:
Textpattern CMS
by:
Alperen Ergel
8.8
CVSS
HIGH
Persistent Cross-Site Scripting
79
CWE
Product Name: Textpattern CMS
Affected Version From: 4.6.2
Affected Version To: 4.6.2
Patch Exists: NO
Related CWE: N/A
CPE: a:textpattern:textpattern:4.6.2
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Windows 10 / Xammp
2020
Textpattern CMS 4.6.2 – ‘body’ Persistent Cross-Site Scripting
Textpattern CMS 4.6.2 is vulnerable to persistent cross-site scripting (XSS) in the 'body' parameter. An attacker can exploit this vulnerability by logging into the administrator page and writing a new blog post with a malicious payload in the 'body' parameter. The payload will then be executed when the page is viewed.
Mitigation:
Input validation should be used to prevent malicious payloads from being executed. Additionally, the application should be configured to use a Content Security Policy (CSP) to prevent malicious scripts from being executed.