Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 05 Mar 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:webgrind_project:webgrind:1.1:*:*:*:*:*:*:* |
Tue, 03 Feb 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Webgrind Project
Webgrind Project webgrind |
|
| CPEs | cpe:2.3:a:webgrind_project:webgrind:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Webgrind Project
Webgrind Project webgrind |
Wed, 14 Jan 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 14 Jan 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jokkedk
Jokkedk webgrind |
|
| Vendors & Products |
Jokkedk
Jokkedk webgrind |
Tue, 13 Jan 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Webgrind 1.1 and before contains a reflected cross-site scripting vulnerability that allows unauthenticated attackers to inject malicious scripts via the file parameter in index.php. The application does not sufficiently encode user-controlled inputs, allowing attackers to execute arbitrary JavaScript in victim's browsers by crafting malicious URLs. | |
| Title | Webgrind 1.1 - Reflected Cross-Site Scripting (XSS) via file Parameter | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-05T01:29:46.765Z
Reserved: 2026-01-10T01:51:52.984Z
Link: CVE-2023-54341
Updated: 2026-01-14T15:45:49.969Z
Status : Analyzed
Published: 2026-01-13T23:16:02.127
Modified: 2026-02-03T19:20:03.940
Link: CVE-2023-54341
No data.
OpenCVE Enrichment
Updated: 2026-01-14T10:49:30Z