CVE-2017-14762: GeniXCMS Cross-site Scripting (XSS) via id parameter
Basic Information
Basic Information
6.1
CVSS Score
3.0
6.1
CVSS Score
3.0
Technical Details
Package Name
Ecosystem
Vulnerable Versions
First Patched Version
genix/cms
composer
= 1.1.4
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability is explicitly tied to the 'id' parameter in menus.control.php
Backend controllers typically handle parameter processing and view rendering
XSS requires unsanitized output of user input - the most likely scenario is a controller method retrieving $_GET['id'] and embedding it directly in HTML output
The file path suggests this is part of the menu management backend where ID parameters are commonly used for CRUD operations
While exact function names aren't provided, the pattern matches common MVC controller methods like edit() that handle record modification interfaces