Multiple vulnerabilities have been reported in Alkacon OpenCms, which can be exploited by malicious people to conduct cross-site scripting attacks.
1) Input passed via HTTP headers to pages using the "redirectPermanently()" method (org/opencms/util/CmsRequestUtil.java) or "sendRedirect()" method (src/org/opencms/flex/CmsFlexResponse.java) is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
2) Input passed via the "title" GET parameter to opencms/system/workplace/views/admin/admin-main.jsp is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
3) Input passed via the "requestedResource" POST parameter to opencms/system/login/index.html is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
The vulnerabilities are reported in versions prior to 8.5.2.