Published:2011/12/22  Last Updated:2011/12/22

PukiWiki Plus! vulnerable to cross-site scripting


PukiWiki Plus! contains a cross-site scripting vulnerability.

Products Affected

  • PukiWiki Plus! 1.4.7plus-u2-i18n and earlier


PukiWiki Plus! is a software that adds wiki functionality to websites. PukiWiki Plus! contains a vulnerability in handling web form entries, which may result in cross-site scripting.


An arbitrary script may be executed on the user's web browser.


Update the Software
Update to the latest version according to the information provided by the developer.


JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Analyzed on 2011.12.22

Measures Conditions Severity
Access Required can be attacked over the Internet using packets
  • High
Authentication anonymous or no authentication (IP addresses do not count)
  • High
User Interaction Required the user must be convinced to take a standard action that does not feel harmful to most users, such as click on a link or view a file
  • Mid
Exploit Complexity the user must be convinced to take a difficult or suspicious action. If the honest user must have elevated privileges, they are likely to be more suspiciouse
  • High

Description of each analysis measures


Koki Nakayasu of Keiji Takeda Lab, Keio University reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Reports
CERT Advisory
CPNI Advisory
CVE CVE-2011-3990
JVN iPedia JVNDB-2011-000107