Vulnerability Description
Zenphoto 1.6 contains a stored cross-site scripting vulnerability in the user postal code field accessible through the admin-users.php interface. When administrators view user information imported as HTML, malicious JavaScript payloads injected into the postal code field execute in their browser context.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zenphoto | Zenphoto | 1.6 |
Related Weaknesses (CWE)
References
- https://www.exploit-db.com/exploits/51485ExploitThird Party AdvisoryVDB Entry
- https://www.vulncheck.com/advisories/zenphoto-stored-cross-site-scripting-via-usExploitThird Party Advisory
- https://www.zenphoto.org/news/zenphoto-1.6/Release Notes
- https://www.exploit-db.com/exploits/51485ExploitThird Party AdvisoryVDB Entry
FAQ
What is CVE-2023-53916?
CVE-2023-53916 is a vulnerability with a CVSS score of 4.6 (MEDIUM). Zenphoto 1.6 contains a stored cross-site scripting vulnerability in the user postal code field accessible through the admin-users.php interface. When administrators view user information imported as ...
How severe is CVE-2023-53916?
CVE-2023-53916 has been rated MEDIUM with a CVSS base score of 4.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-53916?
Check the references section above for vendor advisories and patch information. Affected products include: Zenphoto Zenphoto.