Admidio is an open-source user management solution. Prior to version 4.3.12, an unsafe deserialization vulnerability allows any unauthenticated user to execute arbitrary code on the server. Version 4.3.12 fixes this issue.
Metrics
Affected Vendors & Products
References
History
Wed, 16 Oct 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Admidio
Admidio admidio |
|
CPEs | cpe:2.3:a:admidio:admidio:*:*:*:*:*:*:*:* | |
Vendors & Products |
Admidio
Admidio admidio |
|
Metrics |
ssvc
|
Wed, 16 Oct 2024 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Admidio is an open-source user management solution. Prior to version 4.3.12, an unsafe deserialization vulnerability allows any unauthenticated user to execute arbitrary code on the server. Version 4.3.12 fixes this issue. | |
Title | Admidio vulnerable to HTML Injection In The Messages Section | |
Weaknesses | CWE-502 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-10-16T20:07:29.259Z
Reserved: 2024-10-03T14:06:12.644Z
Link: CVE-2024-47836

Updated: 2024-10-16T20:06:12.432Z

Status : Awaiting Analysis
Published: 2024-10-16T20:15:06.350
Modified: 2024-10-18T12:53:04.627
Link: CVE-2024-47836

No data.