Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1qOXdwLXg1cTUteGgyZs4ABAra

Funadmin Cross-site Scripting vulnerability

An issue was found in funadmin 5.0.2. The selectfiles method in \backend\controller\sys\Attachh.php directly stores the passed parameters and values into the param parameter without filtering, resulting in Cross Site Scripting (XSS).

Permalink: https://github.com/advisories/GHSA-j9wp-x5q5-xh2f
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1qOXdwLXg1cTUteGgyZs4ABAra
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Low
Classification: General
Published: 12 days ago
Updated: 10 days ago


CVSS Score: 6.1
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Identifiers: GHSA-j9wp-x5q5-xh2f, CVE-2024-48228
References: Repository: https://github.com/funadmin/funadmin
Blast Radius: 1.0

Affected Packages

packagist:funadmin/funadmin
Dependent packages: 0
Dependent repositories: 0
Downloads: 764 total
Affected Version Ranges: <= 5.0.2
No known fixed version
All affected versions: 1.5.0, 2.1.0, 2.2.6, 2.2.9, 2.2.10, 2.2.11, 2.2.12, 2.2.13, 2.2.14, 2.3.1, 2.4.0, 2.4.1, 2.4.2, 2.5.0, 2.5.1, 2.5.2, 2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.6.5, 3.0.1, 3.1.0, 3.1.1, 3.2.0, 3.2.1, 3.2.2, 3.2.3, 3.3.0, 3.3.1, 3.3.2, 3.3.3, 5.0.0, 5.0.1, 5.0.2