NVD Vulnerability Detail
Search Exploit, PoC
CVE-2017-20239
Summary

MDwiki contains a cross-site scripting vulnerability that allows remote attackers to execute arbitrary JavaScript by injecting malicious code through the location hash parameter. Attackers can craft URLs with JavaScript payloads in the hash fragment that are parsed and rendered without sanitization, causing the injected scripts to execute in the victim's browser context.

Publication Date April 12, 2026, 10:16 p.m.
Registration Date April 15, 2026, 11:37 a.m.
Last Update April 18, 2026, 1:19 a.m.
CVSS3.1 : MEDIUM
スコア 6.1
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
攻撃元区分(AV) ネットワーク
攻撃条件の複雑さ(AC)
攻撃に必要な特権レベル(PR) 不要
利用者の関与(UI)
影響の想定範囲(S) 変更あり
機密性への影響(C)
完全性への影響(I)
可用性への影響(A) なし
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:dynalon:mdwiki:0.6.2:*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List