Medium severity4.7NVD Advisory· Published May 18, 2017· Updated May 13, 2026
CVE-2017-9071
CVE-2017-9071
Description
In MODX Revolution before 2.5.7, an attacker might be able to trigger XSS by injecting a payload into the HTTP Host header of a request. This is exploitable only in conjunction with other issues such as Cache Poisoning.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
modx/revolutionPackagist | < 2.5.7 | 2.5.7 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/modxcms/revolution/pull/13426nvdPatchVendor AdvisoryWEB
- citadelo.com/en/2017/04/modx-revolution-cms/nvdExploitPatchThird Party Advisory
- github.com/advisories/GHSA-p2j4-vrgx-96qgghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2017-9071ghsaADVISORY
- citadelo.com/en/2017/04/modx-revolution-cmsghsaWEB
News mentions
0No linked articles in our index yet.