CVE-2024-53255

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-53255
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-53255.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-53255
Aliases
  • GHSA-7q7m-cgw8-px4r
Published
2024-11-25T19:01:37.886Z
Modified
2025-12-05T07:32:57.200201Z
Severity
  • 5.3 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N CVSS Calculator
Summary
Reflected Cross-site Scripting in /admin?page=media via file Parameter in BoidCMS
Details

BoidCMS is a free and open-source flat file CMS for building simple websites and blogs, developed using PHP and uses JSON as a database. In affected versions a reflected Cross-site Scripting (XSS) vulnerability exists in the /admin?page=media endpoint in the file parameter, allowing an attacker to inject arbitrary JavaScript code. This code could be used to steal the user's session cookie, perform phishing attacks, or deface the website. This issue has been addressed in version 2.1.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-79"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/53xxx/CVE-2024-53255.json"
}
References

Affected packages

Git / github.com/boidcms/boidcms

Affected ranges

Type
GIT
Repo
https://github.com/boidcms/boidcms
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v1.*

v1.0.0
v1.0.1

v2.*

v2.0.0
v2.0.1
v2.1.0
v2.1.1