Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Tiki Wiki CMS Groupware < 21.0 XSS Vulnerability

Information

Severity

Severity

Low

Family

Family

Web application abuses

CVSSv2 Base

CVSSv2 Base

3.5

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:M/Au:S/C:N/I:P/A:N

Solution Type

Solution Type

Vendor Patch

Created

Created

4 years ago

Modified

Modified

4 years ago

Summary

Tiki Wiki is prone to a cross-site scripting vulnerability.

Insight

Insight

Some php pages receive input from an upstream component, but do not neutralize or incorrectly neutralize special characters such as '<', '>', and '&'. These characters could be interpreted as web-scripting elements when they are sent to a downstream component that processes web pages.

Affected Software

Affected Software

Tiki Wiki CMS Groupware version 20.0 and prior.

Detection Method

Detection Method

Checks if a vulnerable version is present on the target host.

Solution

Solution

Update to version 21.0.

Common Vulnerabilities and Exposures (CVE)