CVE-2020-14210

MEDIUM

MONITORAPP WAF < 2020-06-16 - Reflected Cross-Site Scripting via Request URL Response

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2020-14210. PoCs published by monitorapp-aicc.

AI-analyzed exploit summary The repository contains only a README.md file with a CVE reference and no functional exploit code or technical details. It lacks any proof-of-concept implementation or meaningful content.

Description

Reflected Cross-Site Scripting (XSS) vulnerability in MONITORAPP WAF in which script can be executed when responding to Request URL information. It provides a function to response to Request URL information when blocking.

Exploits (1)

nomisec STUB 1 stars
by monitorapp-aicc · poc
https://github.com/monitorapp-aicc/report

The repository contains only a README.md file with a CVE reference and no functional exploit code or technical details. It lacks any proof-of-concept implementation or meaningful content.

Classification
Stub 10%
Attack Type
Other
Complexity
Trivial
Reliability
Theoretical
Target: unknown
No auth needed
devstral-2 · analyzed Feb 16, 2026 Full analysis →

Scores

CVSS v3 6.1
EPSS 0.0023
EPSS Percentile 45.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Details

CWE
CWE-79
Status published
Products (2)
monitorapp/application_insight_web_application < 2020-06-16
monitorapp/web_application_firewall < 2020-06-16
Published Jun 16, 2020
Tracked Since Feb 18, 2026