{"id":"CVE-2018-14512","details":"An XSS vulnerability was discovered in WUZHI CMS 4.1.0. There is persistent XSS that allows remote attackers to inject arbitrary web script or HTML via the form[nickname] parameter to the index.php?m=core&f=set&v=sendmail URI. When the administrator accesses the \"system settings - mail server\" screen, the XSS payload is triggered.","modified":"2026-04-11T19:05:49.998502Z","published":"2018-07-23T08:29:00.200Z","references":[{"type":"EVIDENCE","url":"https://github.com/wuzhicms/wuzhicms/issues/143"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/wuzhicms/wuzhicms","events":[{"introduced":"0"},{"last_affected":"0a9144f8da632bbf69d53e4126bc2b6c0b08ee0d"}],"database_specific":{"source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"last_affected":"4.1.0"}],"cpe":"cpe:2.3:a:wuzhicms:wuzhicms:4.1.0:*:*:*:*:*:*:*"}}],"versions":["v2.0.1","v2.0.4","v2.0.5","v2.1.2","v2.1.3","v2.1.6","v2.1.7","v3.0.1","v3.0.3","v3.0.3.0","v3.0.4","v3.0.4.0","v3.1.0","v3.1.0.1","v3.1.0.2","v3.1.1","v3.1.2","v3.1.3","v4.0.0","v4.1.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-14512.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}