CVE-2017-16636

Public Exploit

Description

In Bludit v1.5.2 and v2.0.1, an XSS vulnerability is located in the new page, new category, and edit post function body message context. Remote attackers are able to bypass the basic editor validation to trigger cross site scripting. The XSS is persistent and the request method to inject via editor is GET. To save the editor context, the followup POST method request must be processed to perform the attack via the application side. The basic validation of the editor does not allow injecting script codes and blocks the context. Attackers can inject the code by using an editor tag that is not recognized by the basic validation. Thus allows a restricted user account to inject malicious script code to perform a persistent attack against higher privilege web-application user accounts.

Category

5.4
CVSS
Severity: Medium
CVSS 3.0 •
CVSS 2.0 •
EPSS 0.27%
Third-Party Advisory vulnerability-lab.com
Affected: n/a n/a
Published at:
Updated at:

References

Link Tags
https://www.vulnerability-lab.com/get_content.php?id=2000 third party advisory issue tracking exploit

Frequently Asked Questions

What is the severity of CVE-2017-16636?
CVE-2017-16636 has been scored as a medium severity vulnerability.
How to fix CVE-2017-16636?
To fix CVE-2017-16636, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2017-16636 being actively exploited in the wild?
It is possible that CVE-2017-16636 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.