{"id":"CVE-2023-6282","details":"IceHrm 23.0.0.OS does not sufficiently encode user-controlled input, which creates a Cross-Site Scripting (XSS) vulnerability via /icehrm/app/fileupload_page.php, in multiple parameters. An attacker could exploit this vulnerability by sending a specially crafted JavaScript payload and partially hijacking the victim's browser.","modified":"2026-03-14T12:23:27.735751Z","published":"2024-01-25T12:15:45.917Z","references":[{"type":"ADVISORY","url":"https://www.incibe.es/en/incibe-cert/notices/aviso/cross-site-scripting-vulnerability-icehrm"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/gamonoid/icehrm","events":[{"introduced":"0"},{"last_affected":"861e94cf9dc2638eb628c6bf5fb449fc5d4fc9b4"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"23.0.0.os"}]}}],"versions":["13.1.OS","v13.1.OS","v14.0.OS","v14.1.OS","v15.0.OS","v15.2.OS","v16.0.OS","v16.1.OS","v18.0.OS","v19.0.OS","v20.0.OS","v20.2.OS","v20.3.0.OS","v21.0.0.OS","v21.1.0.OS","v23.0.0.OS"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-6282.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}