QID 730415

Date Published: 2022-03-31

QID 730415: Textpattern CMS Cross-Site Scripting (XSS) Vulnerability

Textpattern is a free and open-source content management system for PHP and MySQL. According to builtwith.com it was publicly in use on over two-thousand websites.

Textpattern 4.8.7 is vulnerable to Cross Site Scripting (XSS) via /textpattern/index.php. A remote and unauthenticated attacker can use XSS to trigger remote code execution by uploading a webshell. To do so they must first steal the CSRF token before submitting a file upload request.

Affected Versions:
Textpattern version 4.8.7

QID Detection Logic (Unauthenticated):
This QID checks for vulnerable version of Textpattern CMS by sending a GET request to /index.php?atom=1 and /textpattern/textpattern.js endpoint

Successful exploitation of the vulnerability may allow arbitrary Remote Code Execution.

  • CVSS V3 rated as Critical - 8.3 severity.
  • CVSS V2 rated as Medium - 5.1 severity.
  • Solution

    Customers are advised to upgrade to Textpattern 4.8.8 or later. For more info please refer to TextArea Security Advisory

    CVEs related to QID 730415

    Software Advisories
    Advisory ID Software Component Link
    NA URL Logo textpattern.com/weblog/textpattern-488-released-php-81-support-security-fix-and-more