{"id":"CVE-2023-43340","details":"Cross-site scripting (XSS) vulnerability in evolution v.3.2.3 allows a local attacker to execute arbitrary code via a crafted payload injected into the cmsadmin, cmsadminemail, cmspassword and cmspasswordconfim parameters","aliases":["GHSA-432f-967f-vxg4"],"modified":"2026-04-10T05:02:37.920821Z","published":"2023-10-19T23:15:08.867Z","references":[{"type":"EVIDENCE","url":"https://github.com/sromanhu/-CVE-2023-43340-Evolution-Reflected-XSS---Installation-Admin-Options"},{"type":"EVIDENCE","url":"https://github.com/sromanhu/Evolution-Reflected-XSS---Installation-Admin-Options"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/evolution-cms/evolution","events":[{"introduced":"0"},{"last_affected":"b00a062d1294a7ab74756fca24c7c7991af441c9"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"3.2.3"}]}}],"versions":["1.3.0","1.3.0b","1.3.1","1.3.2","1.3.3","1.3.4","1.4.0","1.4.0.RC","1.4.0.RC2","1.4.0.RC3","1.4.1","1.4.2","1.4.3","1.4.4","2.0","2.0.0-RC","2.0.0-alpha","2.0.1","2.0.2","3.0","3.0.1","3.0.2","3.0RC","3.0RC2","3.0RC3","3.1.0","3.1.1","3.1.2","3.1.3","3.1.4","3.1.5","3.1.6","3.1.7","3.1.8","3.2.0","3.2.1","3.2.2","3.2.3"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-43340.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N"}]}