Fork CMS "report" and "error" Cross-Site Scripting Vulnerabilities
Description
Two vulnerabilities have been discovered in Fork CMS, which can be exploited by malicious people to conduct cross-site scripting attacks.
Input passed via the "report" parameter to e.g. private/en/settings or private/en/blog/settings and the "error" parameter to e.g. private/en/users/index is not properly sanitised in the "execute()" function in backend/core/engine/base.php before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
The vulnerabilities are confirmed in version 3.2.4. Prior versions may also be affected.