You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Reproduction process
1.Log in to the back office,Click on the background navigation function.
2.Click the Add Navigation button,Insert xss payload in the header,As shown below.
3.Then click save and go back to the front page of the cms to trigger the xss vulnerability. Restoration suggestions
1.Backend filters input for pointed brackets.
2.Frontend uses html entity coding output.
The text was updated successfully, but these errors were encountered:
Reproduction process
1.Log in to the back office,Click on the background navigation function.
2.Click the Add Navigation button,Insert xss payload in the header,As shown below.
3.Then click save and go back to the front page of the cms to trigger the xss vulnerability.
Restoration suggestions
1.Backend filters input for pointed brackets.
2.Frontend uses html entity coding output.
The text was updated successfully, but these errors were encountered: