Description
Multiple cross-site scripting (XSS) vulnerabilities in WeBid 1.1.1 allow remote attackers to inject arbitrary web script or HTML via the (1) TPL_name, (2) TPL_nick, (3) TPL_email, (4) TPL_year, (5) TPL_address, (6) TPL_city, (7) TPL_prov, (8) TPL_zip, (9) TPL_phone, (10) TPL_pp_email, (11) TPL_authnet_id, (12) TPL_authnet_pass, (13) TPL_worldpay_id, (14) TPL_toocheckout_id, or (15) TPL_moneybookers_email in a first action to register.php or the (16) username parameter in a login action to user_login.php.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Govind Singh · textwebappsphp
https://www.exploit-db.com/exploits/39249
References (2)
Core 2
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/68519
Exploit x_refsource_misc
http://packetstormsecurity.com/files/127431/WeBid-1.1.1-Cross-Site-Scripting-LDAP-Injection.html
Scores
EPSS
0.0050
EPSS Percentile
66.2%
Details
CWE
CWE-79
Status
published
Products (1)
webidsupport/webid
1.1.1
Published
Jul 25, 2014
Tracked Since
Feb 18, 2026