Description
uBidAuction 2.0.1 contains a reflected cross-site scripting vulnerability in the auctions/myAuctions/status/loose module. The date_created, date_from, date_to, and created_at parameters in the filter functionality are not properly sanitized, allowing remote attackers to inject malicious scripts via crafted GET requests that execute in victims' browsers.
Published: 2026-05-10
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

uBidAuction 2.0.1 includes a reflected XSS flaw in the status/loose myAuctions module. Unsanitized GET parameters date_created, date_from, date_to and created_at allow remote attackers to insert malicious scripts that are executed in users’ browsers. The flaw can be exploited to steal session cookies, deface pages, or redirect users to phishing sites.

Affected Systems

The affected application is uBidAuction v2.0.1, a PHP‑based auction platform. The vulnerability resides in the auctions/myAuctions/status/loose module and affects all installations that have not applied the vendor’s update.

Risk and Exploitability

The CVSS score of 5.1 indicates medium severity. EPSS data is unavailable, and the flaw is not listed in CISA KEV. Attackers can exploit the flaw by sending a crafted URL to a victim via email or social media. Successful exploitation would only require the victim’s interaction, so the risk is moderate but could be amplified by phishing campaigns.

Generated by OpenCVE AI on May 10, 2026 at 13:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade uBidAuction to the latest version that removes the unsanitized input handling in the status/loose module.
  • Implement input validation or output encoding for the date parameters so the browser receives only safe characters.
  • Deploy a strong Content Security Policy header that permits scripts only from trusted origins.
  • Configure a web‑application firewall to detect and block requests containing common XSS payloads and monitor for suspicious query strings.

Generated by OpenCVE AI on May 10, 2026 at 13:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 10 May 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Ubidauction
Ubidauction ubidauction
Vendors & Products Ubidauction
Ubidauction ubidauction

Sun, 10 May 2026 12:45:00 +0000

Type Values Removed Values Added
Description uBidAuction 2.0.1 contains a reflected cross-site scripting vulnerability in the auctions/myAuctions/status/loose module. The date_created, date_from, date_to, and created_at parameters in the filter functionality are not properly sanitized, allowing remote attackers to inject malicious scripts via crafted GET requests that execute in victims' browsers.
Title uBidAuction 2.0.1 myAuctions loose Reflected XSS
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Ubidauction Ubidauction
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-10T12:12:57.301Z

Reserved: 2026-01-11T13:34:26.333Z

Link: CVE-2022-50964

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-10T13:16:34.223

Modified: 2026-05-10T13:16:34.223

Link: CVE-2022-50964

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-10T21:23:48Z

Weaknesses