Unfiltered Input Field in REDAXO 5.6.3 Allows XSS Injection
CVE-2018-18198 · MEDIUM Severity
AV:N/AC:M/AU:N/C:N/I:P/A:N
The $opener_input_field variable in addons/mediapool/pages/index.php in REDAXO 5.6.3 is not effectively filtered and is output directly to the page. The attacker can insert XSS payloads via an index.php?page=mediapool/media&opener_input_field=[XSS] request.
Learn more about our Web Application Penetration Testing UK.