The way comments in article.php (vulnerable function in include/functions-article.php) are handled in Chadha PHPKB Standard Multi-Language 9 allows attackers to execute Stored (Blind) XSS (injecting arbitrary web script or HTML) in admin/manage-comments.php, via the GET parameter cmt.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://antoniocannito.it/?p=137#bxss2 | third party advisory exploit |
https://antoniocannito.it/phpkb1#blind-cross-site-scripting-2-cve-2020-10461 | third party advisory exploit |