Description
Cross-site scripting (XSS) vulnerability in admincp/apilog.php in vBulletin 4.2.2 and earlier, and 5.0.x through 5.0.5 allows remote authenticated users to inject arbitrary web script or HTML via a crafted XMLRPC API request, as demonstrated using the client name.
Exploits (1)
References (7)
Core 7
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id/1031000
Mailing List mailing-list
x_refsource_fulldisc
http://seclists.org/fulldisclosure/2014/Oct/63
Exploit mailing-list
x_refsource_fulldisc
http://seclists.org/fulldisclosure/2014/Oct/55
Exploit x_refsource_misc
http://packetstormsecurity.com/files/128691/vBulletin-5.x-4.x-Persistent-Cross-Site-Scripting.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/97026
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/70577
Exploit x_refsource_misc
https://github.com/tintinweb/pub/tree/master/pocs/cve-2014-2021
Scores
EPSS
0.0091
EPSS Percentile
76.0%
Details
CWE
CWE-79
Status
published
Products (7)
vbulletin/vbulletin
5.0.0
vbulletin/vbulletin
5.0.1
vbulletin/vbulletin
5.0.2
vbulletin/vbulletin
5.0.3
vbulletin/vbulletin
5.0.4
vbulletin/vbulletin
5.0.5
vbulletin/vbulletin
< 4.2.2
Published
Oct 25, 2014
Tracked Since
Feb 18, 2026