Radiant is prone to multiple HTML-injection vulnerabilities because it fails to properly sanitize user-supplied input.
Successful exploits will result in the execution of arbitrary attacker-supplied HTML and script code in the context of the affected application, potentially allowing the attacker to steal cookie-based authentication credentials or control how the page is rendered to the user. Other attacks are also possible.
Radiant 1.1.4 is vulnerable; other versions may also be affected.
Information
Exploit
Attackers can exploit this issue by enticing an unsuspecting victim to follow a malicious URI.
References:
- Multiple Persistent XSS vulnerabilities in Radiant Content Management System (Seclists.org)
- Radiant Homepage (Radiant)