Description
WeBid version up to current version 1.2.2 contains a Cross Site Scripting (XSS) vulnerability in user_login.php, register.php that can result in Javascript execution in the user's browser, injection of malicious markup into the page. This attack appear to be exploitable via The victim user must click a malicous link. This vulnerability appears to have been fixed in after commit 256a5f9d3eafbc477dcf77c7682446cc4b449c7f.
References (3)
Core 3
Core References
Exploit, Third Party Advisory x_refsource_misc
https://telekomsecurity.github.io/assets/advisories/20181108_WeBid_Multiple_Vulnerabilities.txt
Issue Tracking, Release Notes, Vendor Advisory x_refsource_misc
http://bugs.webidsupport.com/view.php?id=648
Patch x_refsource_misc
https://github.com/renlok/WeBid/commit/256a5f9d3eafbc477dcf77c7682446cc4b449c7f
Scores
CVSS v3
6.1
EPSS
0.0048
EPSS Percentile
65.2%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Details
CWE
CWE-79
Status
published
Products (1)
webidsupport/webid
< 1.2.2
Published
Dec 20, 2018
Tracked Since
Feb 18, 2026