QID 730415
Date Published: 2022-03-31
QID 730415: Textpattern CMS Cross-Site Scripting (XSS) Vulnerability
Textpattern is a free and open-source content management system for PHP and MySQL. According to builtwith.com it was publicly in use on over two-thousand websites.
Textpattern 4.8.7 is vulnerable to Cross Site Scripting (XSS) via /textpattern/index.php. A remote and unauthenticated attacker can use XSS to trigger remote code execution by uploading a webshell. To do so they must first steal the CSRF token before submitting a file upload request.
Affected Versions:
Textpattern version 4.8.7
QID Detection Logic (Unauthenticated):
This QID checks for vulnerable version of Textpattern CMS by sending a GET request to /index.php?atom=1 and /textpattern/textpattern.js endpoint
Successful exploitation of the vulnerability may allow arbitrary Remote Code Execution.
Customers are advised to upgrade to Textpattern 4.8.8 or later. For more info please refer to TextArea Security Advisory
- Textpattern Security Advisory -
textpattern.com/weblog/textpattern-488-released-php-81-support-security-fix-and-more
CVEs related to QID 730415
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| NA |
|