Fortinet FortiWLC is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote authenticated attacker could exploit this vulnerability using the ESS profile or the Radius Profile to inject malicious script into a Web page which would be executed in a victim’s Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.
Fortinet FortiWLC 8.5.2
Refer to FortiGuard Advisory FG-IR-20-016 for patch, upgrade or suggested workaround information.