Description
Cross-site scripting (XSS) vulnerability in starnet/index.php in SyndeoCMS 3.0.01 and earlier allows remote authenticated users to inject arbitrary web script or HTML via the email parameter (aka Email address field) in an edit_user configuration action.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Ivano Binetti · textwebappsphp
https://www.exploit-db.com/exploits/18686
References (6)
Core 6
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/80746
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/52840
Exploit x_refsource_misc
http://www.webapp-security.com/wp-content/uploads/2012/03/syndeocms_3.0.01-Persistent-XSS.txt
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/74545
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/18686/
Exploit, Third Party Advisory x_refsource_misc
http://packetstormsecurity.org/files/111405/SyndeoCMS-3.0.01-Cross-Site-Scripting.html
Scores
EPSS
0.0087
EPSS Percentile
75.5%
Details
CWE
CWE-79
Status
published
Products (12)
syndeocms/syndeocms
2.4
syndeocms/syndeocms
2.4.10
syndeocms/syndeocms
2.5.00
syndeocms/syndeocms
2.5.01
syndeocms/syndeocms
2.6.00
syndeocms/syndeocms
2.7.00
syndeocms/syndeocms
2.8.00
syndeocms/syndeocms
2.8.1
syndeocms/syndeocms
2.8.02
syndeocms/syndeocms
2.9.00
... and 2 more
Published
Apr 17, 2012
Tracked Since
Feb 18, 2026