Gibbon v22.0.00 suffers from a stored XSS vulnerability within the wall messages component.
5.4CVSS
5.1AI Score
0.001EPSS
A reflected XSS vulnerability exists in multiple pages in version 22 of the Gibbon application that allows for arbitrary execution of JavaScript (gibbonCourseClassID, gibbonPersonID, subpage, currentDate, or allStudents to index.php).
6.1CVSS
6.1AI Score
0.001EPSS
Gibbon CMS v22.0.01 was discovered to contain a cross-site scripting (XSS) vulnerability, that allows attackers to inject arbitrary script via name parameters.
4.8CVSS
5AI Score
0.001EPSS
Multiple cross-site scripting (XSS) vulnerabilities in the component outcomes_addProcess.php of Gibbon CMS v22.0.01 allow attackers to execute arbitrary web scripts or HTML via a crafted payload insterted into the name, category, description parameters.
5.4CVSS
5.4AI Score
0.001EPSS
Gibbon v23 does not generate a new session ID cookie after a user authenticates, making the application vulnerable to session fixation.
8.8CVSS
8.6AI Score
0.002EPSS
Gibbon v25.0.0 is vulnerable to a Local File Inclusion (LFI) where it's possible to include the content of several files present in the installation folder in the server's response.
9.8CVSS
9.3AI Score
0.032EPSS
Multiple Cross-Site Scripting (XSS) vulnerabilities have been identified in Gibbon v25.0.0, which enable attackers to execute arbitrary Javascript code.
6.1CVSS
6.3AI Score
0.001EPSS
GibbonEdu Gibbon version 25.0.1 and before allows Arbitrary File Write because rubrics_visualise_saveAjax.phps does not require authentication. The endpoint accepts the img, path, and gibbonPersonID parameters. The img parameter is expected to be a base64 encoded image. If the path parameter is set...
9.8CVSS
9.7AI Score
0.005EPSS
GibbonEdu Gibbon version 25.0.0 allows HTML Injection via an IFRAME element to the Messager component.
5.4CVSS
5.6AI Score
0.0004EPSS
GibbonEdu Gibbon through version 25.0.0 allows Directory Traversal via the report template builder. An attacker can create a new Asset Component. The templateFileDestination parameter can be set to an arbitrary pathname (and extension). This allows creation of PHP files outside of the uploads direc...
7.2CVSS
6.9AI Score
0.0005EPSS
GibbonEdu Gibbon through version 25.0.0 allows /modules/Planner/resources_addQuick_ajaxProcess.php file upload with resultant XSS. The imageAsLinks parameter must be set to Y to return HTML code. The filename attribute of the bodyfile1 parameter is reflected in the response.
6.1CVSS
6.2AI Score
0.0005EPSS