
Cloud Vulnerability DB
A community-led vulnerabilities database
Cross Site Scripting (XSS) vulnerability in Feehi CMS through version 2.1.1 allows attackers to run arbitrary code via the user name field of the login page. The vulnerability was discovered and disclosed on July 3, 2021 (MITRE, NIST).
The vulnerability exists in the login form of Feehi CMS where user input from the username field is not properly sanitized before being reflected back to the webpage. This allows attackers to inject and execute malicious JavaScript code in the context of the web application (GitHub Issue).
If successfully exploited, this vulnerability allows attackers to execute arbitrary JavaScript code in users' browsers. This could lead to theft of sensitive information, session hijacking, or other malicious actions performed in the context of the logged-in user's session.
Users should upgrade to a version newer than 2.1.1 which contains fixes for this vulnerability. If upgrading is not immediately possible, implementing proper input validation and output encoding for user-supplied data can help mitigate the risk.
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."