CVE-2008-0258

phprunman < 1.0.2 - Cross-Site Scripting via Message Parameter

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2008-0258. PoCs published by Christophe VG.

AI-analyzed exploit summary The provided text describes a cross-site scripting (XSS) vulnerability in PHP Running Management versions prior to 1.0.3. It includes a proof-of-concept URL demonstrating the vulnerability by injecting a script tag.

Description

Cross-site scripting (XSS) vulnerability in index.php in PHP Running Management (phpRunMan) before 1.0.3 allows remote attackers to inject arbitrary web script or HTML via the message parameter.

Exploits (1)

exploitdb WRITEUP VERIFIED
by Christophe VG · textwebappsphp
https://www.exploit-db.com/exploits/31022

The provided text describes a cross-site scripting (XSS) vulnerability in PHP Running Management versions prior to 1.0.3. It includes a proof-of-concept URL demonstrating the vulnerability by injecting a script tag.

Classification
Writeup 90%
Attack Type
Xss
Complexity
Trivial
Reliability
Reliable
Target: PHP Running Management < 1.0.3
No auth needed
Prerequisites: Access to the vulnerable web application
MITRE ATT&CK
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (5)

Core 5
Core References
Patch, Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/28474
Exploit, Patch vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/27268
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/39639

Scores

EPSS 0.0057
EPSS Percentile 68.9%

Details

CWE
CWE-79
Status published
Products (1)
php_running_management/phprunman < 1.0.2
Published Jan 15, 2008
Tracked Since Feb 18, 2026