-
CVSS Score
-The vulnerability sources explicitly identify controller methods handling specific parameters (domain/transport/name/goto/captchatext) across different endpoints. Each listed function corresponds to a documented attack vector where user-controlled input is reflected/stored without proper sanitization. The Sysdream Labs PoC and file path references provide direct evidence of vulnerable code locations. All functions handle web request parameters that are directly mapped to XSS injection points in the application's views.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| opensolutions/vimbadmin | composer | <= 3.0.15 |