Description
Multiple cross-site scripting (XSS) vulnerabilities in MODx CMS 0.9.6.1 and 0.9.6.1p1 allo remote attackers to inject arbitrary web script or HTML via the (1) search, (2) "a," (3) messagesubject, and (4) messagebody parameters to certain pages as reachable from manager/index.php; (5) highlight, (6) id, (7) email, (8) name, and (9) parent parameters to index.php; and the (10) docgrp and (11) moreResultsPage parameters to index-ajax.php.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Alexandr Polyakov · textwebappsphp
https://www.exploit-db.com/exploits/31120
References (5)
Core 5
Core References
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/487696/100/200/threaded
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/28840
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/40375
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/27672
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/41232
Scores
EPSS
0.0019
EPSS Percentile
40.5%
Details
CWE
CWE-79
Status
published
Products (1)
modxcms/modxcms
0.9.6.1 (2 CPE variants)
Published
Sep 17, 2009
Tracked Since
Feb 18, 2026