Unsanitized query_string Variable in FusionPBX Contact Edit Page Leads to XSS Vulnerability

Unsanitized query_string Variable in FusionPBX Contact Edit Page Leads to XSS Vulnerability

CVE-2019-16973 · MEDIUM Severity

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

In FusionPBX up to 4.5.7, the file app\contacts\contact_edit.php uses an unsanitized "query_string" variable coming from the URL, which is reflected in HTML, leading to XSS.

Learn more about our Contact.