WEPA Print Away is vulnerable to a stored XSS. It does not properly sanitize uploaded filenames, allowing an attacker to deceive a user into uploading a document with a malicious filename, which will be included in subsequent HTTP responses, allowing a stored XSS to occur. This attack is persistent...
6.3CVSS
5.1AI Score
0.001EPSS
WEPA Print Away does not verify that a user has authorization to access documents before generating print orders and associated release codes. This could allow an attacker to generate print orders and release codes for documents they donΒ΄t own and print hem without authorization. In order to exploi...
6.5CVSS
5.4AI Score
0.001EPSS