Files
CVEs-PoC/2021/CVE-2021-25983.md
2025-09-29 21:09:30 +02:00

19 lines
929 B
Markdown

### [CVE-2021-25983](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25983)
![](https://img.shields.io/static/v1?label=Product&message=Factor&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=1.3.8%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=unspecified%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-site%20Scripting%20(XSS)&color=brightgreen)
### Description
In Factor (App Framework & Headless CMS) forum plugin, versions v1.3.8 to v1.8.30, are vulnerable to reflected Cross-Site Scripting (XSS) at the “tags” and “category” parameters in the URL. An unauthenticated attacker can execute malicious JavaScript code and steal the session cookies.
### POC
#### Reference
- https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25983
#### Github
No PoCs found on GitHub currently.