CVE-2024-48624

In segments\edit.php of DomainMOD below v4.12.0, the segid parameter in the GET request can be exploited to cause a reflected Cross Site Scripting (XSS) vulnerability.
References
Link Resource
https://github.com/domainmod/domainmod/issues/175 Exploit Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:*

History

06 May 2025, 18:02

Type Values Removed Values Added
CPE cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:*
First Time Domainmod
Domainmod domainmod
References () https://github.com/domainmod/domainmod/issues/175 - () https://github.com/domainmod/domainmod/issues/175 - Exploit, Issue Tracking, Vendor Advisory

16 Oct 2024, 16:38

Type Values Removed Values Added
Summary
  • (es) En segments\edit.php de DomainMOD anteriores a v4.12.0, el parámetro segid en la solicitud GET puede explotarse para provocar una vulnerabilidad de cross-site scripting (XSS) reflejado.

15 Oct 2024, 18:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
CWE CWE-79

15 Oct 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-15 16:15

Updated : 2025-05-06 18:02


NVD link : CVE-2024-48624

Mitre link : CVE-2024-48624

CVE.ORG link : CVE-2024-48624


JSON object : View

Products Affected

domainmod

  • domainmod
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')