JLex GuestBook 1.6.4 contains a reflected cross-site scripting vulnerability in the 'q' URL parameter that allows attackers to inject malicious scripts. Attackers can craft malicious links with XSS payloads to steal session tokens or execute arbitrary JavaScript in victims' browsers.
Metrics
Affected Vendors & Products
References
History
Mon, 15 Dec 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | JLex GuestBook 1.6.4 contains a reflected cross-site scripting vulnerability in the 'q' URL parameter that allows attackers to inject malicious scripts. Attackers can craft malicious links with XSS payloads to steal session tokens or execute arbitrary JavaScript in victims' browsers. | |
| Title | JLex GuestBook 1.6.4 Reflected Cross-Site Scripting via URL Parameter | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-12-15T20:28:19.826Z
Updated: 2025-12-15T21:47:15.700Z
Reserved: 2025-12-13T14:25:05.000Z
Link: CVE-2023-53882
No data.
Status : Awaiting Analysis
Published: 2025-12-15T21:15:51.140
Modified: 2025-12-16T14:10:11.300
Link: CVE-2023-53882
No data.