Skip to main content

CVE-2023-48201: n/a in n/a

Medium
VulnerabilityCVE-2023-48201cvecve-2023-48201
Published: Sat Jan 27 2024 (01/27/2024, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

Cross Site Scripting (XSS) vulnerability in Sunlight CMS v.8.0.1, allows remote authenticated attackers to execute arbitrary code and escalate privileges via a crafted script to the Content text editor component.

AI-Powered Analysis

AILast updated: 07/07/2025, 23:26:43 UTC

Technical Analysis

CVE-2023-48201 is a Cross Site Scripting (XSS) vulnerability identified in Sunlight CMS version 8.0.1. This vulnerability allows remote authenticated attackers to inject and execute arbitrary scripts within the Content text editor component of the CMS. The attack requires the attacker to be authenticated and to interact with the system (e.g., by submitting crafted content). Exploiting this vulnerability can lead to privilege escalation, enabling the attacker to perform actions beyond their original permissions. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS v3.1 base score is 5.4 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), user interaction (UI:R), scope changed (S:C), and limited impact on confidentiality and integrity (C:L, I:L), with no impact on availability (A:N). No public exploits are currently known, and no patches have been linked yet.

Potential Impact

For European organizations using Sunlight CMS 8.0.1, this vulnerability poses a moderate risk. Since exploitation requires authentication and user interaction, the threat is somewhat limited to insiders or compromised accounts. However, successful exploitation can lead to privilege escalation, potentially allowing attackers to gain administrative control or manipulate content, which could damage organizational reputation, lead to data integrity issues, or facilitate further attacks such as phishing or malware distribution. Given the CMS's role in managing web content, unauthorized script execution could impact website visitors and internal users. The medium severity score reflects these factors. Organizations in sectors with high reliance on web content management, such as media, education, and government, may face increased risk if they use this CMS version.

Mitigation Recommendations

Organizations should immediately audit their use of Sunlight CMS and identify instances running version 8.0.1. Since no official patches are linked yet, temporary mitigations include restricting access to the Content text editor component to trusted users only and implementing strict input validation and output encoding on the CMS side to prevent script injection. Monitoring user activity logs for unusual behavior or privilege escalations is critical. Additionally, organizations should enforce strong authentication mechanisms to reduce the risk of compromised credentials. If possible, isolating the CMS environment and applying web application firewalls (WAFs) with rules targeting XSS patterns can help mitigate exploitation attempts. Planning for an upgrade or patch deployment once available is essential. Security teams should also educate users about the risks of executing or embedding untrusted scripts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-11-13T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68387d4f182aa0cae28316a6

Added to database: 5/29/2025, 3:29:19 PM

Last enriched: 7/7/2025, 11:26:43 PM

Last updated: 8/7/2025, 12:57:37 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats