CVE-2021-20750

Source
https://cve.org/CVERecord?id=CVE-2021-20750
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-20750.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-20750
Aliases
Published
2021-06-28T01:15:07.567Z
Modified
2026-02-11T12:57:10.872268Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

Cross-site scripting vulnerability in EC-CUBE EC-CUBE 3.0.0 to 3.0.18-p2 (EC-CUBE 3 series) and EC-CUBE 4.0.0 to 4.0.5-p1 (EC-CUBE 4 series) allows a remote attacker to inject an arbitrary script by leading an administrator or a user to a specially crafted page and to perform a specific operation.

References

Affected packages

Git / github.com/ec-cube/ec-cube

Affected versions

4.*
4.0.0
4.0.1
4.0.2
4.0.3
4.0.4
4.0.5-rc
Other
co/20190306
co/20190313
co/20190404
co/20190417
co/20190508
co/20190613
co/20190710
co/20190718
co/20190808
co/20190822
co/20190829
co/20190905
co/20190912
co/20190930
co/20191017
co/20191031
co/20191114
co/20191128
co/20191212

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-20750.json"