Description
STVS ProVision 5.9.10 contains a cross-site scripting vulnerability in the 'files' POST parameter that allows authenticated attackers to inject arbitrary HTML code. Attackers can exploit the unvalidated input to execute malicious scripts within a user's browser session in the context of the affected site.
Problem types
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Product status
5.9.9
5.9.7
5.9.1
5.9.0
5.8.6
5.7
5.6
5.5
Credits
LiquidWorm as Gjoko Krstic of Zero Science Lab
References
www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5624.php (Zero Science Lab Disclosure (ZSL-2021-5624))
packetstormsecurity.com/...-5.9.10-Cross-Site-Scripting.html (Packet Storm Security Exploit Entry)
cxsecurity.com/issue/WLB-2021010188 (CXSecurity Vulnerability Listing)
exchange.xforce.ibmcloud.com/vulnerabilities/195723 (IBM X-Force Vulnerability Exchange)
stvs.com/ (Vendor Homepage)
www.vulncheck.com/...ross-site-scripting-via-files-parameter (VulnCheck Advisory: STVS ProVision 5.9.10 Authenticated Reflected Cross-Site Scripting via Files Parameter)
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.