CVE-2006-2635

N/A Unknown
Published: May 30, 2006 Modified: April 16, 2026
View on NVD

Description

Multiple cross-site scripting (XSS) vulnerabilities in Tikiwiki (aka Tiki CMS/Groupware) 1.9.x allow remote attackers to inject arbitrary web script or HTML via malformed nested HTML tags such as "<scr<script>ipt>" in (1) offset and (2) days parameters in (a) tiki-lastchanges.php, the (3) find and (4) offset parameters in (b) tiki-orphan_pages.php, the (5) offset and (6) initial parameters in (c) tiki-listpages.php, and (7) an unspecified field in (d) tiki-remind_password.php; and allow remote authenticated users with admin privileges to inject arbitrary web script or HTML via (8) an unspecified field in a metatags action in (e) tiki-admin.php, the (9) offset parameter in (f) tiki-admin_rssmodules.php, the (10) offset and (11) max parameters in (g) tiki-syslog.php, the (12) numrows parameter in (h) tiki-adminusers.php, (13) an unspecified field in (i) tiki-adminusers.php, (14) an unspecified field in (j) tiki-admin_hotwords.php, unspecified fields in (15) "Assign new module" and (16) "Create new user module" in (k) tiki-admin_modules.php, (17) an unspecified field in "Add notification" in (l) tiki-admin_notifications.php, (18) the offset parameter in (m) tiki-admin_notifications.php, the (19) Name and (20) Dsn fields in (o) tiki-admin_dsn.php, the (21) offset parameter in (p) tiki-admin_content_templates.php, (22) an unspecified field in "Create new template" in (q) tiki-admin_content_templates.php, and the (23) offset parameter in (r) tiki-admin_chat.php.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/20334
Source: cve@mitre.org
Exploit Patch Vendor Advisory
http://www.osvdb.org/26048
Source: cve@mitre.org
http://www.osvdb.org/26049
Source: cve@mitre.org
http://www.osvdb.org/26050
Source: cve@mitre.org
http://www.osvdb.org/26051
Source: cve@mitre.org
http://www.osvdb.org/26052
Source: cve@mitre.org
http://www.osvdb.org/26053
Source: cve@mitre.org
http://www.osvdb.org/26054
Source: cve@mitre.org
http://www.osvdb.org/26055
Source: cve@mitre.org
http://www.osvdb.org/26056
Source: cve@mitre.org
http://www.osvdb.org/26057
Source: cve@mitre.org
http://www.osvdb.org/26058
Source: cve@mitre.org
http://www.osvdb.org/26059
Source: cve@mitre.org
http://www.osvdb.org/26060
Source: cve@mitre.org
http://www.osvdb.org/26061
Source: cve@mitre.org
http://www.osvdb.org/26062
Source: cve@mitre.org
http://www.securityfocus.com/bid/18143
Source: cve@mitre.org
Exploit
http://www.vupen.com/english/advisories/2006/2024
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/20334
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Patch Vendor Advisory
http://securityreason.com/securityalert/976
Source: af854a3a-2127-422b-91ae-364da2661108
http://tikiwiki.org/tiki-read_article.php?articleId=131
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/26048
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/26049
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/26050
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/26051
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/26052
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/26053
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/26054
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/26055
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/26056
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/26057
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/26058
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/26059
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/26060
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/26061
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/26062
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/435127/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/436432/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/18143
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.vupen.com/english/advisories/2006/2024
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory

44 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
11.9%
94th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

tiki