### [CVE-2024-9279](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9279) ![](https://img.shields.io/static/v1?label=Product&message=Mee-Admin&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=1.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=1.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=1.2%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=1.3%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=1.4%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=1.5%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=1.6%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Cross%20Site%20Scripting&color=brightgreen) ### Description A vulnerability, which was classified as problematic, was found in funnyzpc Mee-Admin up to 1.6. This affects an unknown part of the file /mee/index of the component User Center. The manipulation of the argument User Nickname leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. Es wurde eine problematische Schwachstelle in funnyzpc Mee-Admin bis 1.6 gefunden. Hiervon betroffen ist ein unbekannter Codeblock der Datei /mee/index der Komponente User Center. Durch das Beeinflussen des Arguments User Nickname mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung. ### POC #### Reference - https://vuldb.com/?id.278661 #### Github No PoCs found on GitHub currently.