Description
Cross Site Scripting vulnerability in Gibbon before v.27.0.01 and fixed in v.28.0.00 allows a remote attacker to obtain sensitive information via the email parameter found in /Gibbon/modules/User Admin/user_manage_editProcess.php.
Published: 2024-11-21
Score: 3.5 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 17 Jul 2025 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Gibbonedu
Gibbonedu gibbon
CPEs cpe:2.3:a:gibbonedu:gibbon:*:*:*:*:*:*:*:*
Vendors & Products Gibbonedu
Gibbonedu gibbon

Thu, 21 Nov 2024 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Gibbon
Gibbon core
Weaknesses CWE-79
CPEs cpe:2.3:a:gibbon:core:*:*:*:*:*:*:*:*
Vendors & Products Gibbon
Gibbon core
Metrics cvssV3_1

{'score': 3.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 21 Nov 2024 18:30:00 +0000

Type Values Removed Values Added
Description Cross Site Scripting vulnerability in Gibbon before v.27.0.01 and fixed in v.28.0.00 allows a remote attacker to obtain sensitive information via the email parameter found in /Gibbon/modules/User Admin/user_manage_editProcess.php.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-11-21T19:56:23.694Z

Reserved: 2024-10-28T00:00:00.000Z

Link: CVE-2024-51337

cve-icon Vulnrichment

Updated: 2024-11-21T19:52:08.610Z

cve-icon NVD

Status : Analyzed

Published: 2024-11-21T19:15:11.523

Modified: 2025-07-17T17:30:10.270

Link: CVE-2024-51337

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses