CVE-2008-0190

Awesometemplateengine - XSS

Title source: rule
STIX 2.1

Description

Multiple cross-site scripting (XSS) vulnerabilities in templates/example_template.php in AwesomeTemplateEngine allow remote attackers to inject arbitrary web script or HTML via the (1) data[title], (2) data[message], (3) data[table][1][item], (4) data[table][1][url], or (5) data[poweredby] parameter.

Exploits (1)

exploitdb WORKING POC VERIFIED
by MustLive · textwebappsphp
https://www.exploit-db.com/exploits/30980

References (7)

Core 7
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/39396
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/3539
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/485786/100/0/threaded
Exploit x_refsource_misc
http://websecurity.com.ua/1694/
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/27125

Scores

EPSS 0.0089
EPSS Percentile 75.6%

Details

CWE
CWE-79
Status published
Products (1)
awesometemplateengine/awesometemplateengine 1
Published Jan 10, 2008
Tracked Since Feb 18, 2026