cve/2024/CVE-2024-48228.md
2025-09-29 21:09:30 +02:00

19 lines
800 B
Markdown

### [CVE-2024-48228](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-48228)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=5.0.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen)
### Description
An issue was found in funadmin 5.0.2. The selectfiles method in \backend\controller\sys\Attachh.php directly stores the passed parameters and values into the param parameter without filtering, resulting in Cross Site Scripting (XSS).
### POC
#### Reference
- https://github.com/funadmin/funadmin/issues/31
#### Github
No PoCs found on GitHub currently.