Unfiltered Input Field in REDAXO 5.6.3 Allows XSS Injection

Unfiltered Input Field in REDAXO 5.6.3 Allows XSS Injection

CVE-2018-18198 · MEDIUM Severity

AV:N/AC:M/AU:N/C:N/I:P/A:N

The $opener_input_field variable in addons/mediapool/pages/index.php in REDAXO 5.6.3 is not effectively filtered and is output directly to the page. The attacker can insert XSS payloads via an index.php?page=mediapool/media&opener_input_field=[XSS] request.

Learn more about our Web Application Penetration Testing UK.