An unauthenticated remote attacker could force all authenticated users, such as administrative users, to perform unauthorized actions by viewing the logs. This action would also grant the attacker privilege escalation.
6.1CVSS
6.3AI Score
0.001EPSS
An authenticated malicious user could acquire the simple mail transfer protocol (SMTP) Password in cleartext format, despite it being protected and hidden behind asterisks. The attacker could then perform further attacks using the SMTP credentials.
6.5CVSS
6.3AI Score
0.001EPSS
An unauthenticated remote attacker could provide a malicious link and trick an unsuspecting user into clicking on it. If clicked, the attacker could execute the malicious JavaScript (JS) payload in the targetβs security context.
6.1CVSS
6.4AI Score
0.001EPSS
An authenticated malicious user could successfully upload a malicious image could lead to a denial-of-service condition.
6.5CVSS
6.3AI Score
0.001EPSS
A malicious user could leverage this vulnerability to escalate privileges or perform unauthorized actions in the context of the targeted privileged users.
5.4CVSS
5.5AI Score
0.001EPSS