Description
The WHM interface 11.15.0 for cPanel 11.18 before 11.18.4 and 11.22 before 11.22.3 allows remote attackers to bypass XSS protection and inject arbitrary script or HTML via repeated, improperly-ordered "<" and ">" characters in the (1) issue parameter to scripts2/knowlegebase, (2) user parameter to scripts2/changeip, (3) search parameter to scripts2/listaccts, and other unspecified vectors.
Exploits (3)
exploitdb
WRITEUP
VERIFIED
by Matteo Carli · textwebappsphp
https://www.exploit-db.com/exploits/31773
exploitdb
WRITEUP
VERIFIED
by Matteo Carli · textwebappsphp
https://www.exploit-db.com/exploits/31771
exploitdb
WRITEUP
VERIFIED
by Matteo Carli · textwebappsphp
https://www.exploit-db.com/exploits/31772
References (8)
Core 8
Core References
Various Sources x_refsource_misc
http://changelog.cpanel.net/?revision=0%3Btree=%3Btreeview=%3Bshow=html%3Bpp=25%3Bte=1314%3Bpg=2
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/42305
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/491864/100/0/threaded
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2008/1522/references
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/3866
Mailing List mailing-list
x_refsource_fulldisc
http://lists.grok.org.uk/pipermail/full-disclosure/2008-May/062197.html
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/29125
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/30166
Scores
EPSS
0.0096
EPSS Percentile
76.6%
Details
CWE
CWE-79
Status
published
Products (7)
cpanel/cpanel
11.18
cpanel/cpanel
11.18.1
cpanel/cpanel
11.18.2
cpanel/cpanel
11.18.3
cpanel/cpanel
11.22
cpanel/cpanel
11.22.1
cpanel/cpanel
11.22.2
Published
May 12, 2008
Tracked Since
Feb 18, 2026