CVE-2023-48124

Medium
|5.4
No Exploit

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to run malicious code on a user's browser by exploiting the registration form of the SUP Online Shopping site. To take advantage of this, the attacker needs to trick users into submitting their information, such as their name or email, through the compromised form.

Technical Description

Cross Site Scripting in SUP Online Shopping v.1.0 allows a remote attacker to execute arbitrary code via the Name, Email and Address parameters in the Register New Account component.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
Confidentiality ImpactLow
Integrity ImpactLow
Availability ImpactNone
ScopeChanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$741($500-$1K)
Vendor Response
Grade FPatched in 812 days

Quick Information

Published

Nov 21, 2023

about 2 years ago

Last Modified

Feb 10, 2026

10 days ago

Vendor

nayem-howlader

Product

sup online shopping