e107 2.1.8 has XSS via the e107_admin/users.php?mode=main&action=list user_loginname parameter.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/dhananjay-bajaj/E107-v2.1.8-XSS-POC | third party advisory exploit |