Impact
The vulnerability is a classic Cross‑Site Scripting flaw that allows an attacker to submit crafted input which is echoed back in the SiteMinder administrative web interface without proper sanitization. Because the data is displayed unchanged, a malicious payload can run in the browser of any user who views the affected page, enabling script execution, cookie theft, session hijacking, or UI manipulation. The weakness is identified as CWE‑79, and the CVSS score of 4.6 reflects low‑to‑moderate impact for attackers who can access the admin UI.
Affected Systems
Broadcom SiteMinder administrators using the web‑based management console are impacted. The advisory references the Broadcom product line without specifying affected releases, so all versions that expose the unvalidated input path within the administrative UI should be considered vulnerable until a fix is applied.
Risk and Exploitability
With an EPSS below 1% and no listing in the KEV catalog, public exploitation is currently improbable, but the existence of the flaw means that anyone with administrative login credentials or an ability to inject content into the UI can trigger the risk. Attackers would need to direct a compromised user to view the malicious page or gain a foothold in the admin console. The advisory does not provide an exploit example, so while the risk remains theoretical, the potential for client‑side compromise warrants ongoing monitoring and timely patching.
OpenCVE Enrichment