{"id":"CVE-2024-32743","details":"A cross-site scripting (XSS) vulnerability in the Settings section of WonderCMS v3.4.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the SITE LANGUAGE CONFIG parameter under the Security module.","modified":"2026-03-14T12:33:17.195546Z","published":"2024-04-17T21:15:09.783Z","references":[{"type":"EVIDENCE","url":"https://github.com/adiapera/xss_security_wondercms_3.4.3"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/robiso/wondercms","events":[{"introduced":"0"},{"last_affected":"ee41c1381213b6b948caadddc810708eea202eaa"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"3.4.3"}]}}],"versions":["1.1.0-beta","1.2.0-beta","2.0.0","2.0.1","2.0.2","2.0.3","2.0.4","2.0.5","2.0.6","2.1.0","2.2.0","2.2.1","2.3.0","2.3.1","2.3.2","2.4.0","2.4.1","2.4.2","2.5.0","2.5.1","2.5.2","2.6.0","2.7.0","3.0.4","3.0.5","3.0.6","3.0.7","3.0.8","3.1.0","3.1.1","3.1.2","3.1.3","3.1.4","3.2.0","3.3.0","3.3.1","3.3.2","3.3.3","3.3.4","3.4.0","3.4.1","3.4.2","3.4.3"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-32743.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L"}]}