Multiple cross-site scripting (XSS) vulnerabilities in action/AttachFile.py in MoinMoin before 1.8.1 allow remote attackers to inject arbitrary web script or HTML via an AttachFile action to the WikiSandBox component with (1) the rename parameter or (2) the drawing parameter (aka the basename variable).
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DSA-1715-1 | New moin packages fix insufficient input sanitising |
![]() |
EUVD-2022-3012 | Multiple cross-site scripting (XSS) vulnerabilities in action/AttachFile.py in MoinMoin before 1.8.1 allow remote attackers to inject arbitrary web script or HTML via an AttachFile action to the WikiSandBox component with (1) the rename parameter or (2) the drawing parameter (aka the basename variable). |
![]() |
GHSA-7hjm-hqgj-xv9f | MoinMoin Multiple cross-site scripting (XSS) vulnerabilities |
![]() |
USN-716-1 | MoinMoin vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T04:24:18.448Z
Reserved: 2009-01-23T00:00:00
Link: CVE-2009-0260

No data.

Status : Deferred
Published: 2009-01-23T19:00:05.233
Modified: 2025-04-09T00:30:58.490
Link: CVE-2009-0260

No data.

No data.