Impact
A reflected cross‑site scripting vulnerability exists in the web management interface of cym1102 nginxWebUI in an unknown function of /adminPage/conf/check. Manipulating the nginxDir argument allows an attacker to inject arbitrary JavaScript into pages presented to a user.
Affected Systems
The flaw affects all installations of cym1102 nginxWebUI up to and including version 4.3.7, specifically the /adminPage/conf/check endpoint. No other products or newer versions are known to be vulnerable.
Risk and Exploitability
The CVSS base score of 5.1 indicates moderate severity, while an EPSS score of less than 1 % indicates a low probability of exploitation at this time. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires remote access to the web application and the ability to supply requests to the nginxDir parameter; an attacker can trigger the payload remotely without additional authentication. The flaw enables arbitrary JavaScript execution within the context of the user viewing the page.
OpenCVE Enrichment