CVE-2024-36819

MAP-OS 4.45.0 and earlier is vulnerable to Cross-Site Scripting (XSS). This vulnerability allows malicious users to insert a malicious payload into the "Client Name" input. When a service order from this client is created, the malicious payload is displayed on the administrator and employee dashboards, resulting in unauthorized script execution whenever the dashboard is loaded.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

cpe:2.3:a:mapos:map-os:*:*:*:*:*:*:*:*

History

03 Jul 2025, 16:28

Type Values Removed Values Added
References () https://github.com/RamonSilva20/mapos/tree/master - () https://github.com/RamonSilva20/mapos/tree/master - Product
References () https://github.com/RamonSilva20/mapos/commit/3559bae4782162faab94670f503fd35b0f331929 - () https://github.com/RamonSilva20/mapos/commit/3559bae4782162faab94670f503fd35b0f331929 - Patch
CPE cpe:2.3:a:mapos:map-os:*:*:*:*:*:*:*:*
First Time Mapos
Mapos map-os

25 Jun 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-25 19:15

Updated : 2025-07-03 16:28


NVD link : CVE-2024-36819

Mitre link : CVE-2024-36819


JSON object : View

Products Affected

mapos

  • map-os
CWE

No CWE.