Description
PostNuke 0.750 and 0.760RC3 allows remote attackers to obtain sensitive information via a direct request to (1) theme.php or (2) Xanthia.php in the Xanthia module, (3) user.php, (4) thelang.php, (5) text.php, (6) html.php, (7) menu.php, (8) finclude.php, or (9) button.php in the pnblocks directory in the Blocks module, (10) config.php in the NS-Multisites (aka Multisites) module, or (11) xmlrpc.php, which reveals the path in an error message.
Scores
EPSS
0.0032
EPSS Percentile
54.9%
Details
CWE
CWE-425
Status
published
Products (2)
postnuke/postnuke
0.750
postnuke/postnuke
0.760 rc3
Published
May 24, 2005
Tracked Since
Feb 18, 2026