Description
A security vulnerability has been detected in mtons mblog up to 3.5.0. This vulnerability affects unknown code of the file /post/submit of the component Post Handler. The manipulation of the argument content/title/ leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.
In mtons mblog bis 3.5.0 wurde eine Schwachstelle gefunden. Hiervon betroffen ist ein unbekannter Codeblock der Datei /post/submit der Komponente Post Handler. Die Veränderung des Parameters content/title/ resultiert in cross site scripting. Ein Angriff ist aus der Distanz möglich. Der Exploit steht zur öffentlichen Verfügung.
Problem types
Product status
3.1
3.2
3.3
3.4
3.5.0
Timeline
2025-08-25: | Advisory disclosed |
2025-08-25: | VulDB entry created |
2025-08-25: | VulDB entry last update |
Credits
ZAST.AI (VulDB User)
References
vuldb.com/?id.321270 (VDB-321270 | mtons mblog Post submit cross site scripting)
vuldb.com/?ctiid.321270 (VDB-321270 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.634153 (Submit #634153 | mtons https://gitee.com/mtons/mblog <=3.5.0 Stored XSS)
vuldb.com/?submit.634155 (Submit #634155 | mtons https://gitee.com/mtons/mblog <=3.5.0 Stored XSS (Duplicate))
gitee.com/mtons/mblog/issues/ICPMLJ
gitee.com/mtons/mblog/issues/ICPMLW