First published: Thu Dec 21 2017(Updated: )
The Batch Manager component of Piwigo 2.9.2 is vulnerable to Persistent Cross Site Scripting via tags-* array parameters in an admin.php?page=batch_manager&mode=unit request. An attacker can exploit this to hijack a client's browser along with the data stored in it.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Piwigo Piwigo | =2.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for Piwigo 2.9.2 is CVE-2017-17825.
The severity of CVE-2017-17825 is medium.
The vulnerability CVE-2017-17825 in Piwigo 2.9.2 occurs due to persistent cross-site scripting (XSS) via the tags-* array parameters in an admin.php?page=batch_manager&mode=unit request.
An attacker can exploit the vulnerability CVE-2017-17825 in Piwigo 2.9.2 to hijack a client's browser and access the data stored in it.
To fix the vulnerability CVE-2017-17825 in Piwigo 2.9.2, it is recommended to update to a newer version of Piwigo that includes the necessary security patches.