CVE-2007-4711

Toms Gaestebuch 1.00 - Cross-Site Scripting via Multiple Parameters

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 2 public exploits for CVE-2007-4711. PoCs published by cod3in.

AI-analyzed exploit summary The provided text describes a cross-site scripting (XSS) vulnerability in Toms Gästebuch versions prior to 1.01. It outlines how an attacker can exploit unsanitized user input in the 'homepage', 'mail', and 'name' parameters to execute arbitrary script code in a user's browser context.

Description

Multiple cross-site scripting (XSS) vulnerabilities in Toms Gaestebuch 1.00 allow remote attackers to inject arbitrary web script or HTML via the (1) homepage, (2) mail, and (3) name parameters in a show action to (a) form.php; the (4) language and (5) anzeigebreite parameters to (b) admin/header.php; and the (6) msg parameter to (c) install.php, different vectors than CVE-2006-0706.

Exploits (2)

exploitdb WRITEUP VERIFIED
by cod3in · textwebappsphp
https://www.exploit-db.com/exploits/30553

The provided text describes a cross-site scripting (XSS) vulnerability in Toms Gästebuch versions prior to 1.01. It outlines how an attacker can exploit unsanitized user input in the 'homepage', 'mail', and 'name' parameters to execute arbitrary script code in a user's browser context.

Classification
Writeup 90%
Attack Type
Xss
Complexity
Trivial
Reliability
Reliable
Target: Toms Gästebuch < 1.01
No auth needed
Prerequisites: Access to the vulnerable application URL
MITRE ATT&CK
devstral-2 · analyzed Feb 16, 2026 Full analysis →
exploitdb WRITEUP VERIFIED
by cod3in · textwebappsphp
https://www.exploit-db.com/exploits/30554

The provided text describes a cross-site scripting (XSS) vulnerability in Toms Gästebuch versions prior to 1.01. It outlines the vulnerability's impact and provides an example URL demonstrating the issue.

Classification
Writeup 90%
Attack Type
Xss
Complexity
Trivial
Reliability
Theoretical
Target: Toms Gästebuch < 1.01
No auth needed
Prerequisites: Access to the vulnerable application
MITRE ATT&CK
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (8)

Core 8
Core References
Patch, Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/26662
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/36404
Exploit, Patch vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/25507
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/36735
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/478803/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/36736
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/3097
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/478360/100/0/threaded

Scores

EPSS 0.0516
EPSS Percentile 90.0%

Details

CWE
CWE-79
Status published
Products (1)
www.toms-seiten.at/toms_gaestebuch 1.00
Published Sep 05, 2007
Tracked Since Feb 18, 2026