CVE-2006-4881
David Bennett PHP-Post <1.0 - XSS
Title source: llmDescription
Multiple cross-site scripting (XSS) vulnerabilities in David Bennett PHP-Post (PHPp) 1.0 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the replyuser parameter in (a) pm.php; (2) the txt_jumpto parameter in (b) dropdown.php; the (3) txt_error and (4) txt_templatenotexist parameters in (c) template.php; the (5) split parameter in certain files, as demonstrated by (d) editprofile.php, (e) search.php, (f) index.php, and (g) pm.php; and the (6) txt_login parameter in (h) loginline.php; and allow remote authenticated users to inject arbitrary web script or HTML via the (7) txt_logout parameter in (i) loginline.php.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by HACKERS PAL · textwebappsphp
https://www.exploit-db.com/exploits/28592
References (11)
Scores
EPSS
0.0353
EPSS Percentile
87.5%
Classification
Status
draft
Affected Products (1)
david_bennett/php-post
< 1.0
Timeline
Published
Sep 19, 2006
Tracked Since
Feb 18, 2026