CVE-2023-54341

Webgrind 1.1 and before contains a reflected cross-site scripting vulnerability that allows unauthenticated attackers to inject malicious scripts via the file parameter in index.php. The application does not sufficiently encode user-controlled inputs, allowing attackers to execute arbitrary JavaScript in victim's browsers by crafting malicious URLs.
Configurations

Configuration 1 (hide)

cpe:2.3:a:webgrind_project:webgrind:*:*:*:*:*:*:*:*

History

03 Feb 2026, 19:20

Type Values Removed Values Added
CPE cpe:2.3:a:webgrind_project:webgrind:*:*:*:*:*:*:*:*
First Time Webgrind Project
Webgrind Project webgrind
References () http://github.com/jokkedk/webgrind/ - () http://github.com/jokkedk/webgrind/ - Product
References () https://www.exploit-db.com/exploits/51074 - () https://www.exploit-db.com/exploits/51074 - Exploit
References () https://www.vulncheck.com/advisories/webgrind-reflected-cross-site-scripting-xss-via-file-parameter - () https://www.vulncheck.com/advisories/webgrind-reflected-cross-site-scripting-xss-via-file-parameter - Third Party Advisory

Information

Published : 2026-01-13 23:16

Updated : 2026-02-03 19:20


NVD link : CVE-2023-54341

Mitre link : CVE-2023-54341

CVE.ORG link : CVE-2023-54341


JSON object : View

Products Affected

webgrind_project

  • webgrind
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')