Description
Erxes, an experience operating system (XOS) with a set of plugins, is vulnerable to cross-site scripting in versions 0.22.3 and prior. This results in client-side code execution. The victim must follow a malicious link or be redirected there from malicious web site. There are no known patches.
Remediation
References
https://github.com/erxes/erxes/blob/f131b49add72032650d483f044d00658908aaf4a/widgets/server/views/widget.ejs#L14
https://github.com/erxes/erxes/blob/f131b49add72032650d483f044d00658908aaf4a/widgets/server/index.ts#L54
https://securitylab.github.com/advisories/GHSL-2021-103-erxes/
Related Vulnerabilities
CVE-2022-32065 Vulnerability in maven package com.ruoyi:ruoyi
CVE-2020-35201 Vulnerability in maven package org.igniterealtime.openfire.plugins:bookmarks
CVE-2013-2251 Vulnerability in maven package org.apache.struts:struts2-core
CVE-2020-28502 Vulnerability in maven package org.webjars.npm:xmlhttprequest-ssl
CVE-2022-31367 Vulnerability in npm package strapi-plugin-content-manager