MDwiki contains a cross-site scripting vulnerability that allows remote attackers to execute arbitrary JavaScript by injecting malicious code through the location hash parameter. Attackers can craft URLs with JavaScript payloads in the hash fragment that are parsed and rendered without sanitization, causing the injected scripts to execute in the victim's browser context.
References
| Link | Resource |
|---|---|
| https://www.exploit-db.com/exploits/46097 | Exploit VDB Entry |
| https://www.vulncheck.com/advisories/mdwiki-cross-site-scripting-via-location-hash-parameter | Third Party Advisory |
Configurations
History
17 Apr 2026, 16:19
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:dynalon:mdwiki:0.6.2:*:*:*:*:*:*:* | |
| First Time |
Dynalon mdwiki
Dynalon |
|
| References | () https://www.exploit-db.com/exploits/46097 - Exploit, VDB Entry | |
| References | () https://www.vulncheck.com/advisories/mdwiki-cross-site-scripting-via-location-hash-parameter - Third Party Advisory |
12 Apr 2026, 13:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-12 13:16
Updated : 2026-04-17 16:19
NVD link : CVE-2017-20239
Mitre link : CVE-2017-20239
CVE.ORG link : CVE-2017-20239
JSON object : View
Products Affected
dynalon
- mdwiki
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
