Vulnerabilities
Vulnerable Software
Webgrind Project:  >> Webgrind  Security Vulnerabilities
Webgrind 1.1 and before contains a reflected cross-site scripting vulnerability that allows unauthenticated attackers to inject malicious scripts via the file parameter in index.php. The application does not sufficiently encode user-controlled inputs, allowing attackers to execute arbitrary JavaScript in victim's browsers by crafting malicious URLs.
CVSS Score
6.1
EPSS Score
0.001
Published
2026-01-13
Webgrind 1.1 contains a remote command execution vulnerability that allows unauthenticated attackers to inject OS commands via the dataFile parameter in index.php. Attackers can execute arbitrary system commands by manipulating the dataFile parameter, such as using payload '0%27%26calc.exe%26%27' to execute commands on the target system.
CVSS Score
9.8
EPSS Score
0.005
Published
2026-01-13
Webgrind 1.5 relies on user input to display a file, which lets anyone view files from the local filesystem (that the webserver user has access to) via an index.php?op=fileviewer&file= URI. NOTE: the vendor indicates that the product is not intended for a "publicly accessible environment.
CVSS Score
7.5
EPSS Score
0.872
Published
2018-06-27
Absolute path traversal vulnerability in Webgrind 1.0 and 1.0.2 allows remote attackers to read arbitrary files via a full pathname in the file parameter to index.php.
CVSS Score
5.0
EPSS Score
0.118
Published
2012-03-19


Contact Us

Shodan ® - All rights reserved