CVE-2014-9241
Description
Multiple cross-site scripting (XSS) vulnerabilities in MyBB (aka MyBulletinBoard) 1.8.x before 1.8.2 allow remote attackers to inject arbitrary web script or HTML via the (1) type parameter to report.php, (2) signature parameter in a do_editsig action to usercp.php, or (3) title parameter in the style-templates module in an edit_template action or (4) file parameter in the config-languages module in an edit action to admin/index.php.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
MyBB 1.8.x before 1.8.2 contains multiple cross-site scripting vulnerabilities via various parameters, allowing arbitrary script injection.
Vulnerability
MyBB versions 1.8.0 through 1.8.1 are affected by multiple cross-site scripting (XSS) vulnerabilities. The flaws exist in the type parameter of report.php, the signature parameter in the do_editsig action of usercp.php, the title parameter in the style-templates module's edit_template action, and the file parameter in the config-languages module's edit action of admin/index.php. MyBB 1.6.15 is not affected [1].
Exploitation
An attacker can exploit these vulnerabilities by crafting a malicious URL or form submission containing JavaScript in the vulnerable parameters. For report.php, no authentication is required. For usercp.php, the victim must be logged in and submit the signature edit form. The admin module vectors require an authenticated administrator to access the respective pages. The attacker does not need any special network position beyond being able to deliver the crafted link or form to the target user.
Impact
Successful exploitation allows an attacker to inject arbitrary web script or HTML into the context of the victim's browser. This can lead to session hijacking, defacement, or theft of sensitive data, depending on the victim's privileges. The impact is limited to the browser session of the targeted user.
Mitigation
The MyBB team released version 1.8.2 on November 13, 2014, which fixes these vulnerabilities [1]. Users should upgrade immediately. No workarounds are documented. The vulnerability is not listed in CISA's Known Exploited Vulnerabilities catalog.
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.