Impact
uBidAuction 2.0.1 contains a reflected cross‑site scripting flaw that allows attackers to inject malicious JavaScript through the date_created, date_from, date_to, and created_at parameters in the news/manage filter. The vulnerable parameters are not properly sanitized, so a crafted GET request can cause arbitrary script execution in victims' browsers.
Affected Systems
The vulnerability affects the uBidAuction product, version 2.0.1. No other versions are listed as affected in the CNA data, and no official patch or upgrade path is provided.
Risk and Exploitability
The CVSS score of 5.1 indicates moderate impact. EPSS is not available, and the flaw is not listed in CISA KEV, so exploitation likelihood is unclear. Attackers can exploit the weakness by creating a URL that includes malicious payloads in the mentioned parameters and delivering it to a victim; when the victim clicks the link, the script runs in their browser.
OpenCVE Enrichment