Sage DPW before 2024_12_000 is vulnerable to Cross Site Scripting (XSS). Low-privileged Sage users with employee role privileges can permanently store JavaScript code in the Kurstitel and Kurzinfo input fields. The injected payload is executed for each authenticated user who views and interacts with the modified data elements.
References
Link | Resource |
---|---|
https://cves.at/posts/cve-cve-2024-56882/writeup/ | Exploit Third Party Advisory |
Configurations
History
01 Oct 2025, 17:42
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:sagedpw:sage_dpw:*:*:*:*:*:*:*:* | |
First Time |
Sagedpw sage Dpw
Sagedpw |
|
References | () https://cves.at/posts/cve-cve-2024-56882/writeup/ - Exploit, Third Party Advisory |
19 Feb 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-79 | |
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
18 Feb 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-18 18:15
Updated : 2025-10-01 17:42
NVD link : CVE-2024-56882
Mitre link : CVE-2024-56882
CVE.ORG link : CVE-2024-56882
JSON object : View
Products Affected
sagedpw
- sage_dpw
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')