Description
An issue was discovered in concrete5 <= 5.6.3.4. The vulnerability exists due to insufficient filtration of user-supplied data (fID) passed to the "concrete5-legacy-master/web/concrete/tools/files/selector_data.php" URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
Remediation
References
Related Vulnerabilities
WordPress Plugin IQ Testimonials Arbitrary File Upload (2.2.7)
Liferay DXP Inefficient Regular Expression Complexity Vulnerability (CVE-2022-42124)
WordPress 3.7.x Multiple Vulnerabilities (3.7 - 3.7.12)
PrestaShop Incorrect Authorization Vulnerability (CVE-2020-5287)
WordPress Plugin WordPress Calls to Action Multiple Vulnerabilities (2.3.7)