A vulnerability has been found in Zavy86 WikiDocs up to 1.0.78 and classified as problematic. This vulnerability affects unknown code of the file template.inc.php. The manipulation of the argument path leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://vuldb.com/?id.317002 | technical description vdb entry |
https://vuldb.com/?ctiid.317002 | signature permissions required |
https://vuldb.com/?submit.609063 | third party advisory |
https://github.com/Zavy86/WikiDocs/issues/256 | issue tracking |
https://github.com/Zavy86/WikiDocs/issues/256#issuecomment-3034714777 | issue tracking |
https://github.com/Zavy86/WikiDocs/issues/256#issue-3201516458 | exploit issue tracking |