An issue was discovered in the image-manager in Xoops 2.5.10. When any image with a JavaScript payload as its name is hovered over in the list or in the Edit page, the payload executes.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/XOOPS/XoopsCore25/commits/master | third party advisory patch |
https://xoops.org/modules/publisher/ | vendor advisory |
https://blog.nirajkhatiwada.com.np/cve-2019-16684-stored-cross-site-scripting/ | third party advisory exploit |