CVE-2024-36819

MAP-OS 4.45.0 and earlier is vulnerable to Cross-Site Scripting (XSS). This vulnerability allows malicious users to insert a malicious payload into the "Client Name" input. When a service order from this client is created, the malicious payload is displayed on the administrator and employee dashboards, resulting in unauthorized script execution whenever the dashboard is loaded.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mapos:map-os:*:*:*:*:*:*:*:*

History

03 Jul 2025, 16:28

Type Values Removed Values Added
First Time Mapos
Mapos map-os
References () https://github.com/RamonSilva20/mapos/commit/3559bae4782162faab94670f503fd35b0f331929 - () https://github.com/RamonSilva20/mapos/commit/3559bae4782162faab94670f503fd35b0f331929 - Patch
References () https://github.com/RamonSilva20/mapos/tree/master - () https://github.com/RamonSilva20/mapos/tree/master - Product
CPE cpe:2.3:a:mapos:map-os:*:*:*:*:*:*:*:*

Information

Published : 2024-06-25 19:15

Updated : 2025-07-03 16:28


NVD link : CVE-2024-36819

Mitre link : CVE-2024-36819

CVE.ORG link : CVE-2024-36819


JSON object : View

Products Affected

mapos

  • map-os
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')