Description
CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.793 (Free/Open Source Version) and 0.9.8.753 (Pro) is vulnerable to Stored/Persistent XSS for Admin Email fields on the "CWP Settings > "Edit Settings" screen. By changing the email ID to any XSS Payload and clicking on Save Changes, the XSS Payload will execute.
Published: 2019-04-18
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2019-2615 CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.793 (Free/Open Source Version) and 0.9.8.753 (Pro) is vulnerable to Stored/Persistent XSS for Admin Email fields on the "CWP Settings > "Edit Settings" screen. By changing the email ID to any XSS Payload and clicking on Save Changes, the XSS Payload will execute.
History

No history.

Subscriptions

Centos-webpanel Centos Web Panel
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T22:40:15.137Z

Reserved: 2019-04-05T00:00:00.000Z

Link: CVE-2019-10893

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-04-18T20:29:00.517

Modified: 2024-11-21T04:20:04.000

Link: CVE-2019-10893

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses