- Description
- SeedDMS versions 6.0.18 and 5.1.25 and below are vulnerable to stored XSS. An attacker with admin privileges can inject the payload inside the "Role management" menu and then trigger the payload by loading the "Users management" menu
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 4.8
- Impact score
- 2.7
- Exploitability score
- 1.7
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 3.5
- Impact score
- 2.9
- Exploitability score
- 6.8
- Vector string
- AV:N/AC:M/Au:S/C:N/I:P/A:N
- nvd@nist.gov
- CWE-79
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:seeddms:seeddms:5.1.25:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D1E00B7A-05EA-48B6-B85D-AF461F651EC7"
},
{
"criteria": "cpe:2.3:a:seeddms:seeddms:6.0.18:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "685E90E4-457F-4C51-9D4C-6FB43320CDB6"
}
],
"operator": "OR"
}
]
}
]