
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability was discovered in Fork CMS v5.8.0 that allows remote attackers to inject malicious script code with persistent attack vectors to compromise browser-to-web-application requests (Vulnerability Lab). The vulnerability was disclosed on April 16, 2020, and affects the displayname input field when using Add, Edit, or Register mechanisms.
The vulnerability exists in the Displayname input field that forwards information into the var parameter. The issue occurs because the var parameter does not encode or parse the injected content and executes it instead. The vulnerability can be exploited via POST requests, with injection points in the registration form and add/edit user functions. The execution points occur in the preview profile, edit user, user index listing, and delete user message context (Vulnerability Lab).
Successful exploitation of the vulnerability can result in session hijacking, persistent phishing attacks, persistent external redirects to malicious sources, and persistent manipulation of affected application modules. The vulnerability affects multiple modules including Preview Profile, Edit User, User Index, and Delete User (Vulnerability Lab).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."