Description
Cross-site scripting (XSS) vulnerability in system/index.php in ExpressionEngine 1.6.4 through 1.6.6, and possibly earlier versions, allows remote attackers to inject arbitrary web script or HTML via the avatar parameter.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Adam Baldwin · textwebappsphp
https://www.exploit-db.com/exploits/32871
References (6)
Core 6
Core References
Exploit x_refsource_misc
http://www.ngenuity.org/wordpress/2009/01/28/ngenuity-2009-003-expressionengine-persistent-cross-site-scripting/
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/502045/100/0/threaded
Various Sources x_refsource_confirm
http://expressionengine.com/docs/changelog.html#v167
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/34379
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/49359
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/34193
Scores
EPSS
0.0183
EPSS Percentile
83.0%
Details
CWE
CWE-79
Status
published
Products (3)
expressionengine/expressionengine
1.6.4
expressionengine/expressionengine
1.6.5
expressionengine/expressionengine
1.6.6
Published
Mar 26, 2009
Tracked Since
Feb 18, 2026