7.5 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): HIGH
- Availability impact (A): NONE
WeGIA has Cross-Site Scripting in Controle de Contribuição
WeGIA is a web manager for charitable institutions. In versions prior to 3.6.10, a Stored Cross-Site Scripting (XSS) vulnerability was identified in the 'Member Registration' (Cadastrar Sócio) function. By injecting a payload into the 'Member Name' (Nome Sócio) field, the script is persistently stored in the database. Consequently, the payload is executed whenever a user navigates to certain URL. Version 3.6.10 fixes the issue.
References
-
https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-42rc-rvrx-cmmw x_refsource_CONFIRM
Affected products
- ==< 3.6.10
Matching in nixpkgs
pkgs.perlPackages.SnowballNorwegian
Porters stemming algorithm for norwegian
pkgs.perl5Packages.SnowballNorwegian
Porters stemming algorithm for norwegian
pkgs.perl538Packages.SnowballNorwegian
Porters stemming algorithm for norwegian
pkgs.perl540Packages.SnowballNorwegian
Porters stemming algorithm for norwegian