An issue was discovered in post.php in bootstrap-multiselect (aka Bootstrap Multiselect) 1.1.2. A PHP script in the source code echoes arbitrary POST data. If a developer adopts this structure wholesale in a live application, it could create a Reflective Cross-Site Scripting (XSS) vulnerability exploitable through Cross-Site Request Forgery (CSRF).
References
Configurations
History
09 Jul 2025, 02:02
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/davidstutz/bootstrap-multiselect/releases - Release Notes | |
References | () https://github.com/projectdiscovery/nuclei-templates/commit/11e1a6c11d3954f44acfb0274b6dad4bd8045103 - Patch | |
CPE | cpe:2.3:a:davidstutz:bootstrap_multiselect:1.1.2:*:*:*:*:*:*:* | |
First Time |
Davidstutz bootstrap Multiselect
Davidstutz |
14 May 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
Summary |
|
|
CWE | CWE-352 |
13 May 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-13 16:15
Updated : 2025-07-09 02:02
NVD link : CVE-2025-47204
Mitre link : CVE-2025-47204
CVE.ORG link : CVE-2025-47204
JSON object : View
Products Affected
davidstutz
- bootstrap_multiselect
CWE
CWE-352
Cross-Site Request Forgery (CSRF)