CVE-2020-14210
MEDIUMMONITORAPP WAF < 2020-06-16 - Reflected Cross-Site Scripting via Request URL Response
Title source: llmExploitation Summary
EIP tracks 1 public exploit for CVE-2020-14210. PoCs published by monitorapp-aicc.
AI-analyzed exploit summary The repository contains only a README.md file with a CVE reference and no functional exploit code or technical details. It lacks any proof-of-concept implementation or meaningful content.
Description
Reflected Cross-Site Scripting (XSS) vulnerability in MONITORAPP WAF in which script can be executed when responding to Request URL information. It provides a function to response to Request URL information when blocking.
Exploits (1)
nomisec
STUB
1 stars
by monitorapp-aicc · poc
https://github.com/monitorapp-aicc/report
The repository contains only a README.md file with a CVE reference and no functional exploit code or technical details. It lacks any proof-of-concept implementation or meaningful content.
Classification
Stub 10%
Attack Type
Other
Complexity
Trivial
Reliability
Theoretical
Target:
unknown
No auth needed
devstral-2 · analyzed Feb 16, 2026
Full analysis →
References (2)
Core 2
Core References
Third Party Advisory x_refsource_misc
https://github.com/kbgsft/vuln-AIWAF/wiki/Cross-site-scripting%28XSS%29-vulnerability-in-AIWAF-in-MONITORAPP-by-xcuter
Third Party Advisory x_refsource_misc
https://github.com/monitorapp-aicc/report/wiki/CVE-2020-14210
Scores
CVSS v3
6.1
EPSS
0.0023
EPSS Percentile
45.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Details
CWE
CWE-79
Status
published
Products (2)
monitorapp/application_insight_web_application
< 2020-06-16
monitorapp/web_application_firewall
< 2020-06-16
Published
Jun 16, 2020
Tracked Since
Feb 18, 2026