Description
Cross-site scripting (XSS) vulnerability in WoltLab Community Gallery 2.0 before 2014-12-26 allows remote attackers to inject arbitrary web script or HTML via the parameters[data][7][title] parameter in a saveImageData action to index.php/AJAXProxy.
Exploits (1)
References (7)
Core 7
Core References
Exploit mailing-list
x_refsource_fulldisc
http://seclists.org/fulldisclosure/2015/Mar/65
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/119455
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/73053
Exploit x_refsource_misc
http://packetstormsecurity.com/files/130766/Community-Gallery-2.0-Cross-Site-Scripting.html
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/534841/100/0/threaded
Exploit x_refsource_misc
http://www.itas.vn/news/itas-team-found-out-a-stored-xss-vulnerability-in-burning-board-community-gallery-77.html
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/36368
Scores
EPSS
0.1396
EPSS Percentile
94.3%
Details
CWE
CWE-79
Status
published
Products (1)
wotlab/community_gallery
2.0
Published
Mar 12, 2015
Tracked Since
Feb 18, 2026