CVE-2023-54360
Description
Joomla JLex Review 6.0.1 contains a reflected cross-site scripting vulnerability that allows attackers to inject malicious scripts by manipulating the review_id URL parameter. Attackers can craft malicious links containing JavaScript payloads that execute in victims' browsers when clicked, enabling session hijacking or credential theft.
CWE
- CWE-79 — Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Affected
- Jlexart / Joomla JLex Review — v=6.0.1 [affected]
CVSS
- 4.0 score=5.1 severity=MEDIUM
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N - 3.1 score=6.1 severity=MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
References
- https://www.exploit-db.com/exploits/51645 exploit
- https://jlexart.com/ product
- https://extensions.joomla.org/extension/jlex-review/ product
- https://www.vulncheck.com/advisories/joomla-jlex-review-reflected-xss-via-review-id-parameter third-party-advisory
Source
cvelistV5-main/cves/2023/54xxx/CVE-2023-54360.json