Learn about CVE-2020-9467 affecting Piwigo 2.10.1, allowing stored XSS attacks via the file parameter in a /ws.php request. Find mitigation steps and prevention measures here.
Piwigo 2.10.1 has a stored XSS vulnerability via the file parameter in a /ws.php request due to the pwg.images.setInfo function.
Understanding CVE-2020-9467
This CVE involves a stored XSS vulnerability in Piwigo 2.10.1, potentially allowing attackers to execute malicious scripts.
What is CVE-2020-9467?
Piwigo 2.10.1 is susceptible to stored XSS through the file parameter in a /ws.php request, exploiting the pwg.images.setInfo function.
The Impact of CVE-2020-9467
The vulnerability could enable attackers to inject and execute malicious scripts, compromising the security and integrity of the Piwigo platform.
Technical Details of CVE-2020-9467
Piwigo 2.10.1's vulnerability is detailed below:
Vulnerability Description
The flaw allows stored XSS attacks via the file parameter in a /ws.php request, leveraging the pwg.images.setInfo function.
Affected Systems and Versions
Exploitation Mechanism
Attackers can exploit this vulnerability by manipulating the file parameter in a /ws.php request to execute malicious scripts.
Mitigation and Prevention
Protect your system from CVE-2020-9467 with the following measures:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates