Cross Site Scripting vulnerability in Gibbon before v.27.0.01 and fixed in v.28.0.00 allows a remote attacker to obtain sensitive information via the email parameter found in /Gibbon/modules/User Admin/user_manage_editProcess.php.
References
Link | Resource |
---|---|
https://github.com/GibbonEdu/core | Product |
https://github.com/aziz0x48/CVEs-and-Vulnerabilities/blob/main/CVE-2024-51337.md | Exploit Third Party Advisory |
Configurations
History
17 Jul 2025, 17:30
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:gibbonedu:gibbon:*:*:*:*:*:*:*:* | |
First Time |
Gibbonedu gibbon
Gibbonedu |
|
References | () https://github.com/GibbonEdu/core - Product | |
References | () https://github.com/aziz0x48/CVEs-and-Vulnerabilities/blob/main/CVE-2024-51337.md - Exploit, Third Party Advisory |
Information
Published : 2024-11-21 19:15
Updated : 2025-07-17 17:30
NVD link : CVE-2024-51337
Mitre link : CVE-2024-51337
CVE.ORG link : CVE-2024-51337
JSON object : View
Products Affected
gibbonedu
- gibbon
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')