{"id":"CVE-2023-36289","details":"An unauthenticated Cross-Site Scripting (XSS) vulnerability found in Webkul QloApps 1.6.0 allows an attacker to obtain a user's session cookie and then impersonate that user via POST email_create and back parameter.","modified":"2026-04-12T08:32:12.002178Z","published":"2023-06-23T15:15:10.537Z","references":[{"type":"EVIDENCE","url":"https://flashy-lemonade-192.notion.site/Cross-site-scripting-in-POST-Request-via-email_create-and-back-parameter-in-QloApps-1-6-0-e05548203d744daf9047d82fc94b19b7?pvs=4"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/Qloapps/QloApps","events":[{"introduced":"0"},{"last_affected":"ccace94c38ec8732594d74d7cca5a318ded89aa8"}],"database_specific":{"source":"CPE_FIELD","cpe":"cpe:2.3:a:webkul:qloapps:1.6.0:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"last_affected":"1.6.0"}]}}],"versions":["v0.3","v1.3.0","v1.3.1","v1.3.2","v1.4.0","v1.4.1","v1.5.0","v1.5.2","v1.6.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-36289.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}