Vulnerability Details : CVE-2021-38143
An issue was discovered in Form Tools through 3.0.20. When an administrator creates a customer account, it is possible for the customer to log in and proceed with a change of name and last name. However, these fields are vulnerable to XSS payload insertion, being triggered in the admin panel when the admin tries to see the client list. This type of XSS (stored) can lead to the extraction of the PHPSESSID cookie belonging to the admin.
Vulnerability category: Cross site scripting (XSS)
Products affected by CVE-2021-38143
- cpe:2.3:a:formtools:core:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-38143
0.15%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 52 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-38143
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST | |
6.1
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
2.8
|
2.7
|
NIST |
CWE ids for CVE-2021-38143
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-38143
-
https://github.com/formtools/core
GitHub - formtools/core: The Form Tools Core.Product;Third Party Advisory
-
https://github.com/bernardofsr/CVEs-With-PoC/blob/main/PoCs/Form%20Tools/README.md
CVEs-With-PoC/README.md at main · bernardofsr/CVEs-With-PoC · GitHubExploit;Third Party Advisory
-
https://bernardofsr.github.io/blog/2021/form-tools/
Bernardo Rodrigues | BlogExploit;Third Party Advisory
-
https://www.formtools.org/
Form ToolsProduct;Vendor Advisory
Jump to