Description
Cross-Site Scripting vulnerability in moziloCMS version 2.0. By sending a POST request to the '/install.php' endpoint, a JavaScript payload could be executed in the 'username' parameter.
Published: 2024-03-07
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

There is no reported solution at this time.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-27201 Cross-Site Scripting vulnerability in moziloCMS version 2.0. By sending a POST request to the '/install.php' endpoint, a JavaScript payload could be executed in the 'username' parameter.
History

No history.

Subscriptions

Mozilocms Mozilocms
cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published:

Updated: 2024-08-01T19:03:39.451Z

Reserved: 2024-03-07T08:08:16.136Z

Link: CVE-2024-2245

cve-icon Vulnrichment

Updated: 2024-08-01T19:03:39.451Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-03-07T13:15:07.590

Modified: 2024-11-21T09:09:20.533

Link: CVE-2024-2245

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-07-13T11:32:10Z

Weaknesses