An XSS vulnerability in pxc_portCntr.php can be used by...
High severity
Unreviewed
Published
Dec 9, 2025
to the GitHub Advisory Database
•
Updated Dec 9, 2025
Description
Published by the National Vulnerability Database
Dec 9, 2025
Published to the GitHub Advisory Database
Dec 9, 2025
Last updated
Dec 9, 2025
An XSS vulnerability in pxc_portCntr.php can be used by an unauthenticated remote attacker to trick an authenticated user to click on the link provided by the attacker in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device configuration parameters that are available in the context of the web application. The session cookie is secured by the httpOnly Flag. Therefore an attacker is not able to take over the session of an authenticated user.
References