CVE-2021-47950
Description
Advanced Guestbook 2.4.4 contains a persistent cross-site scripting vulnerability in the smilies administration interface that allows authenticated attackers to inject malicious scripts by manipulating the s_emotion parameter. Attackers can submit POST requests to admin.php with JavaScript code in the s_emotion field, which executes when administrators view the smilies tab.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Advanced Guestbook 2.4.4 has a persistent XSS in the smilies admin interface via the s_emotion parameter, enabling authenticated attackers to execute scripts.
Vulnerability
CVE-2021-47950 describes a persistent cross-site scripting (XSS) vulnerability in Advanced Guestbook 2.4.4, specifically within the smilies administration interface. The root cause is the lack of proper input sanitization on the s_emotion parameter, allowing attackers to inject arbitrary JavaScript code that is stored and later executed in the browser of any user viewing the smilies tab [1][2].
Exploitation
To exploit this vulnerability, an attacker must first authenticate as an administrator. They then navigate to the "Smilies" tab, edit an existing emotion icon, and modify the emotion description (s_emotion) field to contain malicious JavaScript. Upon submitting the form and subsequently viewing the smilies list, the injected script executes in the context of the administrator's session [1].
Impact
Successful exploitation allows the attacker to execute arbitrary JavaScript within the admin panel. This can lead to session hijacking, defacement of the guestbook, or further attacks against administrators. The vulnerability is rated Medium with a CVSS v3 score of 6.4, reflecting the need for authenticated access and user interaction [2].
Mitigation
No official patch has been released for Advanced Guestbook 2.4.4, as the application appears to be abandoned. Users are advised to migrate to an alternative script or implement web application firewall rules to block malicious input in the s_emotion parameter. Given the presence of a public exploit, this vulnerability should be prioritized for remediation [1][2].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: = 2.4.4
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.