FaceSentry Access Control System 6.4.8 contains a cross-site scripting vulnerability in the 'msg' parameter of pluginInstall.php that allows attackers to inject malicious scripts. Attackers can exploit the unvalidated input to execute arbitrary JavaScript in victim browsers, potentially stealing authentication credentials and conducting phishing attacks.
References
| Link | Resource |
|---|---|
| https://cxsecurity.com/issue/WLB-2019070017 | Third Party Advisory |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/163191 | Third Party Advisory |
| https://packetstormsecurity.com/files/153494 | Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5527.php | Exploit Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5527.php | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-01-08 00:15
Updated : 2026-01-22 13:47
NVD link : CVE-2019-25277
Mitre link : CVE-2019-25277
CVE.ORG link : CVE-2019-25277
JSON object : View
Products Affected
iwt
- facesentry_access_control_system
- facesentry_access_control_system_firmware
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
