### [CVE-2021-34590](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34590) ![](https://img.shields.io/static/v1?label=Product&message=CC612&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=CC613&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=ICC15xx&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=ICC16xx&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=5.11.x%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=5.12.x%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=5.13.x%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=5.20.x%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-site%20Scripting%20(XSS)&color=brightgreen) ### Description In Bender/ebee Charge Controllers in multiple versions are prone to Cross-site Scripting. An authenticated attacker could write HTML Code into configuration values. These values are not properly escaped when displayed. ### POC #### Reference - https://cert.vde.com/en/advisories/VDE-2021-047 #### Github No PoCs found on GitHub currently.