Description
Multiple cross-site scripting (XSS) vulnerabilities in templates/example_template.php in AwesomeTemplateEngine allow remote attackers to inject arbitrary web script or HTML via the (1) data[title], (2) data[message], (3) data[table][1][item], (4) data[table][1][url], or (5) data[poweredby] parameter.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by MustLive · textwebappsphp
https://www.exploit-db.com/exploits/30980
References (7)
Core 7
Core References
Exploit mailing-list
x_refsource_fulldisc
http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059439.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/39396
Exploit x_refsource_misc
http://securityvulns.ru/Sdocument784.html
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/3539
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/485786/100/0/threaded
Exploit x_refsource_misc
http://websecurity.com.ua/1694/
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/27125
Scores
EPSS
0.0089
EPSS Percentile
75.6%
Details
CWE
CWE-79
Status
published
Products (1)
awesometemplateengine/awesometemplateengine
1
Published
Jan 10, 2008
Tracked Since
Feb 18, 2026