DokuWiki through 2017-02-19c has stored XSS when rendering a malicious RSS or Atom feed, in /inc/parser/xhtml.php. An attacker can create or edit a wiki that uses RSS or Atom data from an attacker-controlled server to trigger JavaScript execution. The JavaScript can be in an author field, as demonstrated by the dc:creator element.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://github.com/splitbrain/dokuwiki/issues/2081 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T18:51:07.391Z
Reserved: 2017-08-21T00:00:00
Link: CVE-2017-12980

No data.

Status : Modified
Published: 2017-08-21T07:29:00.313
Modified: 2024-11-21T03:10:34.567
Link: CVE-2017-12980

No data.