Persistent cross-site scripting (XSS) in the web application of MOD3GP-SY-120K allows an authenticated remote attacker to introduce arbitrary JavaScript by injecting an XSS payload into the field MAIL_RCV. When a legitimate user attempts to access to the vulnerable page of the web application, the XSS payload will be executed.









Project Subscriptions

Vendors Products
Socomec Subscribe
Modulys Gp Subscribe
Modulys Gp Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2023-42381 Persistent cross-site scripting (XSS) in the web application of MOD3GP-SY-120K allows an authenticated remote attacker to introduce arbitrary JavaScript by injecting an XSS payload into the field MAIL_RCV. When a legitimate user attempts to access to the vulnerable page of the web application, the XSS payload will be executed.
Fixes

Solution

Socomec reports that MODULYS GP (MOD3GP-SY-120K) is an End-of-Life product. Socomec recommends using MODULYS GP2 (M4-S-XXX) instead. MODULYS GP2 (M4-S-XXX) is not affected by the above vulnerabilities.


Workaround

No workaround given by the vendor.

History

Wed, 18 Jun 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-06-18T14:29:30.087Z

Reserved: 2023-09-06T15:41:16.557Z

Link: CVE-2023-38582

cve-icon Vulnrichment

Updated: 2024-08-02T17:46:56.361Z

cve-icon NVD

Status : Modified

Published: 2023-09-18T21:15:54.693

Modified: 2024-11-21T08:13:52.483

Link: CVE-2023-38582

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses