J-Security Center

Title: e107 CMS 'submitnews.php' Multiple HTML Injection Vulnerabilities

Severity: MODERATE


e107 CMS is a content manager implemented in PHP.

The application is prone to multiple HTML-injection vulnerabilities because it fails to sanitize user-supplied input to the 'author_name', 'itemtitle', and 'item' parameters of the 'submitnews.php' script. The injected data will be displayed to the application administrator in the 'news preview' section in the 'newspost.php' script.

Attacker-supplied HTML and script code could execute in the context of the affected website, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user; other attacks are also possible.

These issues affect e107 CMS 0.7.11; other versions may also be vulnerable.

Affected Products:

  • e107.org e107 website system 0.7.11


Juniper Networks provides this content via a wide variety of sources and production methods. If notified of errors or omissions in the content of this page, Juniper Networks, at its discretion, will modify or remove the page or leave the content as is, depending on various factors including but not limited to the reputation and authority of the party providing the notification. Please use the contact information displayed elsewhere on this page to report any errors or omissions regarding the content on this page.