CVE-2006-4881

David Bennett PHP-Post <1.0 - XSS

Title source: llm

Description

Multiple cross-site scripting (XSS) vulnerabilities in David Bennett PHP-Post (PHPp) 1.0 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the replyuser parameter in (a) pm.php; (2) the txt_jumpto parameter in (b) dropdown.php; the (3) txt_error and (4) txt_templatenotexist parameters in (c) template.php; the (5) split parameter in certain files, as demonstrated by (d) editprofile.php, (e) search.php, (f) index.php, and (g) pm.php; and the (6) txt_login parameter in (h) loginline.php; and allow remote authenticated users to inject arbitrary web script or HTML via the (7) txt_logout parameter in (i) loginline.php.

Exploits (1)

exploitdb WORKING POC VERIFIED
by HACKERS PAL · textwebappsphp
https://www.exploit-db.com/exploits/28592

Scores

EPSS 0.0353
EPSS Percentile 87.5%

Classification

Status draft

Affected Products (1)

david_bennett/php-post < 1.0

Timeline

Published Sep 19, 2006
Tracked Since Feb 18, 2026