VYPR
Medium severity6.1NVD Advisory· Published Apr 1, 2017· Updated May 13, 2026

CVE-2017-7391

CVE-2017-7391

Description

A Cross-Site Scripting (XSS) was discovered in 'Magmi 0.7.22'. The vulnerability exists due to insufficient filtration of user-supplied data (prefix) passed to the 'magmi-git-master/magmi/web/ajax_gettime.php' URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
dweeves/magmiPackagist
< 0.7.240.7.24

Affected products

1

Patches

1
a9566b141b58

Merge pull request #525 from bestshow/master

https://github.com/dweeves/magmi-gitSebastien BracquemontMar 28, 2017via ghsa
1 file changed · +1 1
  • magmi/web/ajax_gettime.php+1 1 modified
    @@ -1,2 +1,2 @@
     <?php
    -echo $_REQUEST["prefix"] . ":" . strftime("%c");
    +echo htmlspecialchars($_REQUEST["prefix"]).":".strftime("%c”);
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

7

News mentions

0

No linked articles in our index yet.