VYPR
Medium severity6.4NVD Advisory· Published May 10, 2026· Updated May 12, 2026

CVE-2021-47950

CVE-2021-47950

Description

Advanced Guestbook 2.4.4 contains a persistent cross-site scripting vulnerability in the smilies administration interface that allows authenticated attackers to inject malicious scripts by manipulating the s_emotion parameter. Attackers can submit POST requests to admin.php with JavaScript code in the s_emotion field, which executes when administrators view the smilies tab.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Advanced Guestbook 2.4.4 has a persistent XSS in the smilies admin interface via the s_emotion parameter, enabling authenticated attackers to execute scripts.

Vulnerability

CVE-2021-47950 describes a persistent cross-site scripting (XSS) vulnerability in Advanced Guestbook 2.4.4, specifically within the smilies administration interface. The root cause is the lack of proper input sanitization on the s_emotion parameter, allowing attackers to inject arbitrary JavaScript code that is stored and later executed in the browser of any user viewing the smilies tab [1][2].

Exploitation

To exploit this vulnerability, an attacker must first authenticate as an administrator. They then navigate to the "Smilies" tab, edit an existing emotion icon, and modify the emotion description (s_emotion) field to contain malicious JavaScript. Upon submitting the form and subsequently viewing the smilies list, the injected script executes in the context of the administrator's session [1].

Impact

Successful exploitation allows the attacker to execute arbitrary JavaScript within the admin panel. This can lead to session hijacking, defacement of the guestbook, or further attacks against administrators. The vulnerability is rated Medium with a CVSS v3 score of 6.4, reflecting the need for authenticated access and user interaction [2].

Mitigation

No official patch has been released for Advanced Guestbook 2.4.4, as the application appears to be abandoned. Users are advised to migrate to an alternative script or implement web application firewall rules to block malicious input in the s_emotion parameter. Given the presence of a public exploit, this vulnerability should be prioritized for remediation [1][2].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.