{"uuid": "83f8cc69-47b8-42f1-b6ed-96931086d524", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52084", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12351", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-52084\n\ud83d\udd25 CVSS Score: 2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: Winter is a free, open-source content management system. Prior to 1.2.4, Users with access to backend forms that include a ColorPicker FormWidget can provide a value that would then be rendered unescaped in the backend form, potentially allowing for a stored XSS attack. This issue has been patched in v1.2.4.\n\ud83d\udccf Published: 2023-12-28T22:15:59.952Z\n\ud83d\udccf Modified: 2025-04-17T20:27:13.689Z\n\ud83d\udd17 References:\n1. https://github.com/wintercms/winter/security/advisories/GHSA-43w4-4j3c-jx29\n2. https://github.com/wintercms/winter/commit/517f65dfae679b57575b047de13c5af48915a5ba", "creation_timestamp": "2025-04-17T20:58:20.000000Z"}