First published: Wed Jan 16 2019(Updated: )
Serendipity 2.0.4 has XSS via the serendipity_admin.php serendipity[body] parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Serendipity (S9Y) Freetag Event | =2.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10737 is classified as a medium severity vulnerability due to its potential for exploitation via XSS.
To fix CVE-2016-10737, upgrade to a later version of Serendipity that addresses the XSS vulnerability.
The impact of CVE-2016-10737 is that it allows attackers to inject malicious scripts through the serendipity[body] parameter.
CVE-2016-10737 is specifically present in Serendipity version 2.0.4; later versions should not be affected.
CVE-2016-10737 can be exploited for cross-site scripting (XSS) attacks, potentially allowing an attacker to hijack user sessions.