Description
A vulnerability classified as problematic was found in Guizhou Xiaoma Technology jpress 5.1.2. Affected by this vulnerability is an unknown functionality of the file /commons/attachment/upload of the component Avatar Handler. The manipulation of the argument files leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
References (4)
Core 4
Core References
Third Party Advisory vdb-entry
technical-description
https://vuldb.com/?id.286381
Permissions Required signature
permissions-required
https://vuldb.com/?ctiid.286381
Third Party Advisory third-party-advisory
https://vuldb.com/?submit.453637
Exploit, Third Party Advisory exploit
https://github.com/dycccccccc/jpress/blob/main/JPRESS%20file%20upload%20leads%20to%20code%20execution.docx
Scores
CVSS v3
3.5
EPSS
0.0007
EPSS Percentile
21.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-94
CWE-434
CWE-79
Status
published
Products (1)
jpress/jpress
5.1.2
Published
Nov 28, 2024
Tracked Since
Feb 18, 2026