CVE-2009-4250
CutePHP CuteNews <8b - XSS
Title source: llmDescription
Multiple cross-site scripting (XSS) vulnerabilities in CutePHP CuteNews 1.4.6 and UTF-8 CuteNews before 8b allow remote attackers to inject arbitrary web script or HTML via (1) the result parameter to register.php; (2) the user parameter to search.php; the (3) cat_msg, (4) source_msg, (5) postponed_selected, (6) unapproved_selected, and (7) news_per_page parameters in a list action to the editnews module of index.php; and (8) the link tag in news comments. NOTE: some of the vulnerabilities require register_globals to be enabled and/or magic_quotes_gpc to be disabled.
Exploits (2)
exploitdb
WRITEUP
VERIFIED
by Andrew Horton · textwebappsphp
https://www.exploit-db.com/exploits/33343
exploitdb
WRITEUP
VERIFIED
by Andrew Horton · textwebappsphp
https://www.exploit-db.com/exploits/10002
References (8)
Scores
EPSS
0.0532
EPSS Percentile
89.9%
Classification
CWE
CWE-79
Status
published
Affected Products (9)
cutephp/cutenews
korn19/utf-8_cutenews
< 8
korn19/utf-8_cutenews
korn19/utf-8_cutenews
korn19/utf-8_cutenews
korn19/utf-8_cutenews
korn19/utf-8_cutenews
korn19/utf-8_cutenews
n/a/n/a
Timeline
Published
Dec 10, 2009
Tracked Since
Feb 18, 2026