VYPR
Unrated severityNVD Advisory· Published Mar 13, 2014· Updated May 6, 2026

CVE-2014-1877

CVE-2014-1877

Description

Multiple cross-site scripting (XSS) vulnerabilities in Dokeos 2.1.1 allow remote attackers to inject arbitrary web script or HTML via the (1) Phone, (2) Street, (3) Address line, (4) Zip code, or (5) City field to main/auth/profile.php; (6) Subject field to main/social/groups.php; or (7) Message body field to main/messages/view_message.php.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Dokeos 2.1.1 fails to sanitize user profile, group, and message fields, enabling stored XSS via arbitrary script injection.

Vulnerability

CVE-2014-1877 describes multiple stored cross-site scripting (XSS) vulnerabilities in Dokeos version 2.1.1. The application fails to sanitize user-supplied input before storing it in the database and later displaying it on several pages. Affected fields include Phone, Street, Address line, Zip code, and City on main/auth/profile.php; the Subject field on main/social/groups.php; and Message body on main/messages/view_message.php. Any user with the ability to edit their profile or create group posts and messages can inject arbitrary script code [2][3].

Exploitation

An attacker must have a valid account on the Dokeos instance and be able to access the vulnerable forms. For profile fields, the attacker edits their profile via main/auth/profile.php and injects a JavaScript payload (e.g., ><iframe/onload=alert(document.domain)>). After the profile is saved, any other user who views the attacker's profile (URL pattern /main/social/profile.php?u=3) triggers the stored script in their browser. Similarly, for group subjects and private messages, the attacker posts crafted values that execute when other users view the corresponding group page or message [2].

Impact

Successful exploitation allows an attacker to execute arbitrary HTML and JavaScript in the context of the victim's browser session, potentially leading to session hijacking, defacement, or redirection to malicious sites. The attacker does not need elevated privileges beyond a normal user account, and the compromise directly affects anyone viewing the attacker's profile, groups, or messages [2][3].

Mitigation

No official patch or fixed version from Dokeos is mentioned in the available references. As of the publication date (March 2014), administrators should consider upgrading to a later version if available, or apply input validation and output encoding for all user-supplied fields. The vulnerability is not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog [2][3].

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.