- Description
- Cross Site Scripting vulnerability in Wonder CMS v.3.2.0 thru v.3.4.2 allows a remote attacker to execute arbitrary code via a crafted script uploaded to the installModule component.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 6.1
- Impact score
- 2.7
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
- Hype score
- Not currently trending
🔥 New CTF Walkthrough: HackTheBox | Sea 🌊🔥 🕵️♂️ Learn how to exploit CVE-2023-41425, SSH Port Forwarding, and Command Injection in this Linux box. Check it out now! 🎥👇 Writeup: https://t.co/pMUEyIBp1M Thanks, FisMatHack for this awesome box! #HackTheBox #CTF
@AnuragTaparia1
30 Dec 2024
22 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Sea is an easymachine from @hackthebox_eu: CVE-2023-41425: XSS vulnerabiity in WonderCMS leading to a RCE=>database creds exfiltration. And finally we’ll be abusing a command injection in an internal monitoring service running as root to pwn the machine. https://t.co/bKRDa3ZC5
@_kujen5
21 Dec 2024
23 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
- CVE-2023-41425 - WonderCMS XSS which finally leads to Code Execution - Hash Cracking - bcrypt $2*$, Blowfish (Unix) - Bypass filter/check #CyberSecurity #pentest #OSINT #hackerone #Top1000 #Trick #infosecurity https://t.co/vu2WQ9NRne
@infosec_jet
2 Nov 2024
38 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wondercms:wondercms:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "12378343-FA06-47FB-B3A5-BE3858A34347",
"versionEndIncluding": "3.4.2",
"versionStartIncluding": "3.2.0"
}
],
"operator": "OR"
}
]
}
]