CVE-2008-1385
Description
Cross-site scripting (XSS) vulnerability in the Top Referrers (aka referrer) plugin in Serendipity (S9Y) before 1.3.1 allows remote attackers to inject arbitrary web script or HTML via the Referer HTTP header.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Serendipity 1.3.1 and earlier have a persistent XSS in the Top Referrers plugin because the Referer header is not escaped.
Vulnerability
The Top Referrers (also known as referrer) plugin in Serendipity (S9Y) before version 1.3.1 contains a cross-site scripting (XSS) vulnerability. The plugin does not escape the Referer HTTP header value when displaying it, allowing an attacker to inject arbitrary web script or HTML [1], [2].
Exploitation
An attacker can send a crafted HTTP request to a vulnerable Serendipity blog with a malicious Referer header containing JavaScript. For example, using wget --referer='http://' http://someblog.com/ the injected payload is stored by the referrer plugin and subsequently executed in the browser of any administrator or visitor who views the referrers page [2]. No authentication is required to trigger the stored XSS; the attacker only needs to make the request to the blog.
Impact
Successful exploitation leads to execution of arbitrary JavaScript in the context of the Serendipity administration interface. This can result in session hijacking, defacement, or theft of sensitive information. The XSS is persistent (stored), increasing the chance of affecting multiple users [1], [2].
Mitigation
Upgrade to Serendipity 1.3.1, released on 2008-04-22, which addresses this issue [1]. No workaround is available for earlier versions. The vulnerability is not listed on the CISA KEV catalog.
AI Insight generated on May 24, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: <1.3.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- blog.s9y.org/archives/193-Serendipity-1.3.1-released.htmlnvdPatch
- www.securityfocus.com/bid/28885nvdExploitPatch
- secunia.com/advisories/29942nvdVendor Advisory
- archives.neohapsis.com/archives/fulldisclosure/2008-04/0590.htmlnvd
- int21.de/cve/CVE-2008-1385-s9y.htmlnvd
- www.securityfocus.com/archive/1/491176/100/0/threadednvd
- www.securitytracker.com/idnvd
- www.vupen.com/english/advisories/2008/1348/referencesnvd
- exchange.xforce.ibmcloud.com/vulnerabilities/41965nvd
News mentions
0No linked articles in our index yet.