
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-25969 affects Camaleon CMS application versions 0.0.1 to 2.6.0. The vulnerability is a stored Cross-Site Scripting (XSS) issue that allows unauthenticated attackers to store malicious scripts in the comments section of posts. These scripts are subsequently executed in victims' browsers when they access pages containing the malicious comments (WhiteSource DB).
The vulnerability is classified as CWE-79 (Improper Neutralization of Input During Web Page Generation) with a CVSS v3.1 base score of 6.1. The attack vector is network-based, requires low attack complexity, needs no privileges, but does require user interaction. The scope is changed, with low impact on both confidentiality and integrity (WhiteSource DB).
When exploited, the vulnerability allows attackers to inject and store malicious scripts that execute in victims' browsers when they view affected pages. This can lead to potential theft of sensitive information, session hijacking, or other client-side attacks. The vulnerability affects both regular users and administrators viewing posts with malicious comments (WhiteSource DB).
The vulnerability has been fixed in Camaleon CMS version 2.6.0.1. The fix involves proper sanitization of comment content as evidenced by the removal of raw HTML rendering in the application's views and the implementation of content sanitization in the comment helper (GitHub Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."