{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2018-25086","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-05-30T16:25:19.103Z","datePublished":"2023-06-01T07:00:03.743Z","dateUpdated":"2024-08-05T12:33:49.169Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-20T12:39:44.351Z"},"title":"sea75300 FanPress CM Template Preview templatepreview.php getArticlesPreview cross site scripting","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"CWE-79 Cross Site Scripting"}]}],"affected":[{"vendor":"sea75300","product":"FanPress CM","versions":[{"version":"3.6.0","status":"affected"},{"version":"3.6.1","status":"affected"},{"version":"3.6.2","status":"affected"},{"version":"3.6.3","status":"affected"}],"modules":["Template Preview"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in sea75300 FanPress CM up to 3.6.3. It has been classified as problematic. This affects the function getArticlesPreview of the file inc/controller/action/system/templatepreview.php of the component Template Preview. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 3.6.4 is able to address this issue. The patch is named c380d343c2107fcee55ab00eb8d189ce5e03369b. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-230235."},{"lang":"de","value":"Es wurde eine Schwachstelle in sea75300 FanPress CM bis 3.6.3 ausgemacht. Sie wurde als problematisch eingestuft. Es betrifft die Funktion getArticlesPreview der Datei inc/controller/action/system/templatepreview.php der Komponente Template Preview. Mittels dem Manipulieren mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Ein Aktualisieren auf die Version 3.6.4 vermag dieses Problem zu lösen. Der Patch wird als c380d343c2107fcee55ab00eb8d189ce5e03369b bezeichnet. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":3.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.5,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N"}}],"timeline":[{"time":"2018-01-15T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2018-01-15T00:00:00.000Z","lang":"en","value":"Countermeasure disclosed"},{"time":"2023-05-30T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-05-30T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-06-24T12:27:37.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"VulDB GitHub Commit Analyzer","type":"tool"}],"references":[{"url":"https://vuldb.com/?id.230235","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.230235","tags":["signature","permissions-required"]},{"url":"https://github.com/sea75300/fanpresscm3/commit/c380d343c2107fcee55ab00eb8d189ce5e03369b","tags":["patch"]},{"url":"https://github.com/sea75300/fanpresscm3/releases/tag/v3.6.4","tags":["patch"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T12:33:49.169Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.230235","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.230235","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/sea75300/fanpresscm3/commit/c380d343c2107fcee55ab00eb8d189ce5e03369b","tags":["patch","x_transferred"]},{"url":"https://github.com/sea75300/fanpresscm3/releases/tag/v3.6.4","tags":["patch","x_transferred"]}]}]}}