CVE-2017-6541
Plain English Summary
AI-powered analysis for quick understanding
An attacker can inject and run malicious scripts in a user's browser when they visit a specific page on the webpagetest site, potentially stealing sensitive information or manipulating the user's session. This occurs because the site does not properly filter user input, allowing harmful code to be executed if a user is tricked into clicking a specially crafted link.
Technical Description
Multiple Cross-Site Scripting (XSS) issues were discovered in webpagetest 3.0. The vulnerabilities exist due to insufficient filtration of user-supplied data (benchmark, time) passed to the webpagetest-master/www/benchmarks/viewtest.php URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
CVSS Vector Analysis
Vector String
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 8, 2017
almost 9 years ago
Last Modified
Feb 13, 2026
7 days ago
Vendor
webpagetest project
Product
webpagetest
Related Vulnerabilities
An attacker can inject and run malicious scripts in a user's browser when they visit a specific page on a vulnerable webpagetest site. This happens because the site doesn't properly filter user input for a color setting, allowing the attacker to manipulate the page's content if they can trick someone into visiting a crafted link.
An attacker can inject malicious HTML and script code into a web page, which could then run in the browser of anyone visiting that page. This vulnerability occurs because the application does not properly filter the data provided by users, allowing the attacker to exploit it without needing special access.