RockMongo 1.1.7 contains a stored cross-site scripting vulnerability that allows attackers to inject malicious scripts through multiple unencoded input parameters. Attackers can exploit the vulnerability by submitting crafted payloads in database, collection, and login parameters to execute arbitrary JavaScript in victim's browser.
References
| Link | Resource |
|---|---|
| https://github.com/iwind/rockmongo/ | Product |
| https://www.exploit-db.com/exploits/51437 | Exploit Third Party Advisory |
| https://www.vulncheck.com/advisories/rockmongo-stored-cross-site-scripting-vulnerability-via-multiple-parameters | Third Party Advisory |
| https://www.exploit-db.com/exploits/51437 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-12-18 20:15
Updated : 2025-12-31 17:20
NVD link : CVE-2023-53938
Mitre link : CVE-2023-53938
CVE.ORG link : CVE-2023-53938
JSON object : View
Products Affected
rockmongo
- rockmongo
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
