CVE-2021-31682
MEDIUM NUCLEIAutomatedlogic Webctrl < 6.5 - XSS
Title source: ruleDescription
The login portal for the Automated Logic WebCTRL/WebCTRL OEM web application contains a vulnerability that allows for reflected XSS attacks due to the operatorlocale GET parameter not being sanitized. This issue impacts versions 6.5 and below. This issue works by passing in a basic XSS payload to a vulnerable GET parameter that is reflected in the output without sanitization.
Exploits (1)
Nuclei Templates (1)
WebCTRL OEM <= 6.5 - Cross-Site Scripting
MEDIUMby gy741,dhiyaneshDk
Shodan:
html:"/_common/lvl5/dologin.jsp" || http.html:"/_common/lvl5/dologin.jsp"
FOFA:
body="/_common/lvl5/dologin.jsp"
References (3)
Scores
CVSS v3
6.1
EPSS
0.4107
EPSS Percentile
97.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Details
CWE
CWE-79
Status
published
Products (1)
automatedlogic/webctrl
< 6.5
Published
Oct 22, 2021
Tracked Since
Feb 18, 2026