CVE-2021-31682

MEDIUM NUCLEI

Automatedlogic Webctrl < 6.5 - XSS

Title source: rule

Description

The login portal for the Automated Logic WebCTRL/WebCTRL OEM web application contains a vulnerability that allows for reflected XSS attacks due to the operatorlocale GET parameter not being sanitized. This issue impacts versions 6.5 and below. This issue works by passing in a basic XSS payload to a vulnerable GET parameter that is reflected in the output without sanitization.

Exploits (1)

exploitdb WRITEUP
by 3ndG4me · textwebappsmultiple
https://www.exploit-db.com/exploits/50463

Nuclei Templates (1)

WebCTRL OEM <= 6.5 - Cross-Site Scripting
MEDIUMby gy741,dhiyaneshDk
Shodan: html:"/_common/lvl5/dologin.jsp" || http.html:"/_common/lvl5/dologin.jsp"
FOFA: body="/_common/lvl5/dologin.jsp"

Scores

CVSS v3 6.1
EPSS 0.4107
EPSS Percentile 97.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Details

CWE
CWE-79
Status published
Products (1)
automatedlogic/webctrl < 6.5
Published Oct 22, 2021
Tracked Since Feb 18, 2026