Sage Xrt Business Exchange
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Sage Xrt Business Exchange.
By the Year
In 2026 there have been 0 vulnerabilities in Sage Xrt Business Exchange. Sage Xrt Business Exchange did not have any published security vulnerabilities last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 0 | 0.00 |
| 2024 | 0 | 0.00 |
| 2023 | 2 | 7.10 |
It may take a day or so for new Sage Xrt Business Exchange vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Sage Xrt Business Exchange Security Vulnerabilities
SQLi in Sage XRT Business Exchange 12.4.302 via Authenticated Access
CVE-2022-34324
8.8 - High
- January 01, 2023
Multiple SQL injections in Sage XRT Business Exchange 12.4.302 allow an authenticated attacker to inject malicious data in SQL queries: Add Currencies, Payment Order, and Transfer History.
SQL Injection
Sage XRT BE 12.4.302 Stored XSS in Filters, Display & Notification
CVE-2022-34323
5.4 - Medium
- January 01, 2023
Multiple XSS issues were discovered in Sage XRT Business Exchange 12.4.302 that allow an attacker to execute JavaScript code in the context of other users' browsers. The attacker needs to be authenticated to reach the vulnerable features. An issue is present in the Filters and Display model features (OnlineBanking > Web Monitoring > Settings > Filters / Display models). The name of a filter or a display model is interpreted as HTML and can thus embed JavaScript code, which is executed when displayed. This is a stored XSS. Another issue is present in the Notification feature (OnlineBanking > Configuration > Notifications and alerts > Alerts *). The name of an alert is interpreted as HTML, and can thus embed JavaScript code, which is executed when displayed. This is a stored XSS. (Also, an issue is present in the File download feature, accessible via /OnlineBanking/cgi/isapi.dll/DOWNLOADFRS. When requesting to show the list of downloadable files, the contents of three form fields are embedded in the JavaScript code without prior sanitization. This is essentially a self-XSS.)
XSS
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Sage Xrt Business Exchange or by Sage? Click the Watch button to subscribe.