Vulnerabilities
Vulnerable Software
Gibbonedu:  >> Gibbon  >> 16.0.01  Security Vulnerabilities
Gibbon before 29.0.00 allows CSRF.
CVSS Score
3.7
EPSS Score
0.0
Published
2025-05-27
Cross Site Scripting vulnerability in Gibbon before v.27.0.01 and fixed in v.28.0.00 allows a remote attacker to obtain sensitive information via the email parameter found in /Gibbon/modules/User Admin/user_manage_editProcess.php.
CVSS Score
3.5
EPSS Score
0.002
Published
2024-11-21
Gibbon through 26.0.00 allows /modules/School%20Admin/messengerSettings.php Server Side Template Injection leading to Remote Code Execution because input is passed to the Twig template engine (messengerSettings.php) without sanitization.
CVSS Score
9.8
EPSS Score
0.22
Published
2024-04-03
GibbonEdu Gibbon version 25.0.1 and before allows Arbitrary File Write because rubrics_visualise_saveAjax.phps does not require authentication. The endpoint accepts the img, path, and gibbonPersonID parameters. The img parameter is expected to be a base64 encoded image. If the path parameter is set, the defined path is used as the destination folder, concatenated with the absolute path of the installation directory. The content of the img parameter is base64 decoded and written to the defined file path. This allows creation of PHP files that permit Remote Code Execution (unauthenticated).
CVSS Score
9.8
EPSS Score
0.931
Published
2023-11-14
GibbonEdu Gibbon version 25.0.0 allows HTML Injection via an IFRAME element to the Messager component.
CVSS Score
5.4
EPSS Score
0.003
Published
2023-11-14
GibbonEdu Gibbon through version 25.0.0 allows Directory Traversal via the report template builder. An attacker can create a new Asset Component. The templateFileDestination parameter can be set to an arbitrary pathname (and extension). This allows creation of PHP files outside of the uploads directory, directly in the webroot.
CVSS Score
7.2
EPSS Score
0.004
Published
2023-11-14
GibbonEdu Gibbon through version 25.0.0 allows /modules/Planner/resources_addQuick_ajaxProcess.php file upload with resultant XSS. The imageAsLinks parameter must be set to Y to return HTML code. The filename attribute of the bodyfile1 parameter is reflected in the response.
CVSS Score
6.1
EPSS Score
0.003
Published
2023-11-14
Gibbon v23 does not generate a new session ID cookie after a user authenticates, making the application vulnerable to session fixation.
CVSS Score
8.8
EPSS Score
0.004
Published
2022-05-25


Contact Us

Shodan ® - All rights reserved