TinyWebGallery v2.5 contains a stored cross-site scripting vulnerability that allows authenticated attackers to inject malicious scripts through the folder name parameter. Attackers can edit album folder names with script tags to execute arbitrary JavaScript when other users view the affected gallery pages.
References
| Link | Resource |
|---|---|
| http://www.tinywebgallery.com/ | Product |
| https://www.exploit-db.com/exploits/51442 | Exploit Third Party Advisory VDB Entry |
| https://www.vulncheck.com/advisories/tinywebgallery-stored-cross-site-scripting-via-folder-name-parameter | Third Party Advisory |
| https://www.exploit-db.com/exploits/51442 | Exploit Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2025-12-18 20:15
Updated : 2025-12-24 16:46
NVD link : CVE-2023-53939
Mitre link : CVE-2023-53939
CVE.ORG link : CVE-2023-53939
JSON object : View
Products Affected
tinywebgallery
- tinywebgallery
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
