: Vulnerability ID: HTB22695 : Reference: http://www.htbridge.ch/advisory/xss_in_compactcms.html : Product: CompactCMS : Vendor: compactcms.nl ( http://www.compactcms.nl/ ) : Vulnerable Version: 1.4.1 : Vendor Notification: 04 November 2010 : Vulnerability Type: XSS (Cross Site Scripting) : Status: Fixed by Vendor : Risk level: Low : Credit: High-Tech Bridge SA - Ethical Hacking & Penetration Testing (http://www.htbridge.ch/) : : Vulnerability Details: : User can execute arbitrary JavaScript code within the vulnerable application. : : The vulnerability exists due to failure in the "Comments" module to : properly sanitize user-supplied input in "website" variable. Successful : exploitation of this vulnerability could result in a compromise of the : application, theft of cookie-based authentication credentials, : disclosure or modification of sensitive data. : : Attacker can create comment with special crafted website variable. The : following PoC is available: : : http://host/?a="><script>alert("XSS");</script> Can you confirm this is the correct PoC? This appears to be the "a" parameter and does not specify a script or module. Generally we would expect to see something more like: http://[target]/index.php?&module=Comments&website=[XSS]