CVE-2020-36396

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-36396
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-36396.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-36396
Aliases
Published
2021-07-02T18:15:08Z
Modified
2024-05-14T07:39:22.380043Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

A stored cross site scripting (XSS) vulnerability in the /admin/roles/role component of LavaLite 5.8.0 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the "New" parameter.

References

Affected packages

Git / github.com/lavalite/cms

Affected ranges

Type
GIT
Repo
https://github.com/lavalite/cms
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

5.*

5.5.0
5.5.1
5.5.2
5.5.3
5.5.4
5.5.5
5.5.6
5.5.7
5.5.8
5.5.9
5.6.1
5.6.2
5.7.0
5.7.1
5.7.2
5.7.3
5.7.4

v5.*

v5.0.0
v5.1.1
v5.2.0
v5.2.1
v5.2.2
v5.2.3
v5.2.4
v5.3.0
v5.3.1
v5.3.2
v5.3.3
v5.3.4
v5.3.5
v5.3.6
v5.3.7
v5.4.0
v5.4.1
v5.4.2
v5.4.3
v5.4.4
v5.4.5
v5.8.0