{"id":"CVE-2020-23721","details":"An issue was discovered in FUEL CMS V1.4.7. An attacker can use a XSS payload and bypass a filter via /fuelCM/fuel/pages/edit/1?lang=english.","modified":"2026-04-11T20:42:40.604491Z","published":"2021-03-10T14:15:12.373Z","references":[{"type":"REPORT","url":"https://github.com/daylightstudio/FUEL-CMS/issues/559"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/daylightstudio/fuel-cms","events":[{"introduced":"0"},{"last_affected":"743db8054a7b125eb3f3606d46b15ddc3d36f3db"}],"database_specific":{"cpe":"cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.7:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"last_affected":"1.4.7"}],"source":"CPE_FIELD"}}],"versions":["1.0.3","1.0.4","1.0.5","1.0.6","1.1","1.2","1.3.1","1.3.2","1.4","1.4.1","1.4.2","1.4.5","1.4.6","v0.9","v0.9.2","v1.0","v1.0.1","v1.0.2","v1.4.7"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-23721.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"}]}