### [CVE-2023-2057](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2057) ![](https://img.shields.io/static/v1?label=Product&message=EyouCms&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%201.5.4%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross%20Site%20Scripting&color=brighgreen) ### Description A vulnerability was found in EyouCms 1.5.4. It has been classified as problematic. Affected is an unknown function of the file login.php?m=admin&c=Arctype&a=edit of the component New Picture Handler. The manipulation of the argument litpic_loca leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-225942 is the identifier assigned to this vulnerability. ### POC #### Reference - https://github.com/sleepyvv/vul_report/blob/main/EYOUCMS/XSS1.md - https://vuldb.com/?id.225942 #### Github No PoCs found on GitHub currently.