CVE-2009-5159

MEDIUM

Invision Power Board 2.x-3.0.4 - Cross-Site Scripting via .txt Attachment

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2009-5159. PoCs published by Xacker.

AI-analyzed exploit summary The provided code demonstrates a cross-site scripting (XSS) vulnerability in Invision Power Board versions 2.0 through 3.0.4. The exploit leverages improper input sanitization by injecting a malicious script via an 'onmouseover' event handler.

Description

Invision Power Board (aka IPB or IP.Board) 2.x through 3.0.4, when Internet Explorer 5 is used, allows XSS via a .txt attachment.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Xacker · textwebappsphp
https://www.exploit-db.com/exploits/33394

The provided code demonstrates a cross-site scripting (XSS) vulnerability in Invision Power Board versions 2.0 through 3.0.4. The exploit leverages improper input sanitization by injecting a malicious script via an 'onmouseover' event handler.

Classification
Working Poc 90%
Attack Type
Xss
Complexity
Trivial
Reliability
Reliable
Target: Invision Power Board 2.0 through 3.0.4
No auth needed
Prerequisites: User interaction (mouse movement over the injected element)
MITRE ATT&CK
devstral-2 · analyzed Feb 18, 2026 Full analysis →

References (4)

Core 4
Core References
Third Party Advisory, VDB Entry x_refsource_misc
https://www.securityfocus.com/bid/37263/info
Exploit, Third Party Advisory, VDB Entry x_refsource_misc
https://www.exploit-db.com/exploits/33394

Scores

CVSS v3 6.1
EPSS 0.0077
EPSS Percentile 73.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Details

CWE
CWE-79
Status published
Products (2)
invisioncommunity/invision_power_board 2.0 - 3.0.4
microsoft/internet_explorer 5
Published Mar 13, 2020
Tracked Since Feb 18, 2026