CVE-2023-41508 - A hard-coded password in Super Store Finder v3.6 allows attackers to access the administration panel.# CVE-2023-41508
CVE-2023-41508 - A hard-coded password in Super Store Finder v3.6 allows attackers to access the administration panel.
## Vulnerability Type
Incorrect Access Control
## Vendor of Product
[Super Store Finder](https://superstorefinder.net/)
## Affected Product Code Base
Super Store Finder - Affected version 3.6 or below. Fixed in version 3.7
## CVSS v3.1 Vector (Base Score)
AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H (10.0)
## Affected Component
Affected Web admin console
## Attack Type
Remote
## Impact Denial of Service
true
## Impact Escalation of Privileges
true
## Impact Code execution
true
## Attack Vectors
The default admin password (admin/password) is hardcoded, defeating the authentication's purpose.
Besides, the default admin username and password could not be changed.
**Screenshot of the hardcoded password (admin/password)**

**Screenshot of the Proof-of-Concept to inject stored cross-site scripting (XSS) due to the absence of input validation for the admin panel**

**Screenshot of the Proof-of-Concept to trigger stored cross-site scripting (XSS)**

## Patch Notes
[https://superstorefinder.net/support/forums/topic/super-store-finder-patch-notes/](https://superstorefinder.net/support/forums/topic/super-store-finder-patch-notes/)
[4.0K] /data/pocs/a6b02f66c6417d26efa9aadc452d40e674005252
├── [4.0K] assets
│ └── [4.0K] images
│ ├── [123K] admin01.png
│ ├── [ 61K] admin02.png
│ ├── [ 16K] admin03.png
│ └── [ 14] note.md
├── [ 11K] LICENSE
└── [1.5K] README.md
2 directories, 6 files