CVE-2023-53916

Zenphoto 1.6 contains a stored cross-site scripting vulnerability in the user postal code field accessible through the admin-users.php interface. When administrators view user information imported as HTML, malicious JavaScript payloads injected into the postal code field execute in their browser context.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:zenphoto:zenphoto:1.6:*:*:*:*:*:*:*

History

27 Dec 2025, 17:15

Type Values Removed Values Added
References () https://www.vulncheck.com/advisories/zenphoto-stored-cross-site-scripting-via-user-postal-code-field - Third Party Advisory, Exploit () https://www.vulncheck.com/advisories/zenphoto-stored-cross-site-scripting-via-user-postal-code-field - Exploit, Third Party Advisory
CVSS v2 : unknown
v3 : 5.4
v2 : unknown
v3 : 4.6

24 Dec 2025, 18:04

Type Values Removed Values Added
References () https://www.exploit-db.com/exploits/51485 - () https://www.exploit-db.com/exploits/51485 - Exploit, Third Party Advisory, VDB Entry
References () https://www.vulncheck.com/advisories/zenphoto-stored-cross-site-scripting-via-user-postal-code-field - () https://www.vulncheck.com/advisories/zenphoto-stored-cross-site-scripting-via-user-postal-code-field - Third Party Advisory, Exploit
References () https://www.zenphoto.org/news/zenphoto-1.6/ - () https://www.zenphoto.org/news/zenphoto-1.6/ - Release Notes
CPE cpe:2.3:a:zenphoto:zenphoto:1.6:*:*:*:*:*:*:*
First Time Zenphoto
Zenphoto zenphoto

18 Dec 2025, 15:15

Type Values Removed Values Added
References () https://www.exploit-db.com/exploits/51485 - () https://www.exploit-db.com/exploits/51485 -

17 Dec 2025, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-17 23:15

Updated : 2025-12-27 17:15


NVD link : CVE-2023-53916

Mitre link : CVE-2023-53916

CVE.ORG link : CVE-2023-53916


JSON object : View

Products Affected

zenphoto

  • zenphoto
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')