PatchSiren

PatchSiren cyber security CVE debrief

CVE-2022-50965 Apphp CVE debrief

CVE-2022-50965 describes a reflected cross-site scripting issue in uBidAuction 2.0.1 affecting the posts/manage module. The reported filter parameters date_created, date_from, date_to, and created_at are not properly sanitized, which can let attacker-supplied script content be reflected into a victim’s browser through crafted GET requests. The supplied NVD record was published/modified on 2026-05-10 and maps the issue to CWE-79.

Vendor
Apphp
Product
Unknown
CVSS
MEDIUM 5.1
CISA KEV
Not listed in stored evidence
Original CVE published
2026-05-10
Original CVE updated
2026-05-10
Advisory published
2026-05-10
Advisory updated
2026-05-10

Who should care

Administrators and developers running uBidAuction, security teams responsible for web application input validation, and anyone exposing the affected posts/manage filtering interface to authenticated or unauthenticated users.

Technical summary

The supplied record indicates a reflected XSS condition in the posts/manage filter functionality. The attack path is network-reachable and requires no privileges, but it does require user interaction, consistent with the CVSS vector provided in the source. The vulnerable inputs are the date_created, date_from, date_to, and created_at parameters, which are reported as insufficiently sanitized before being rendered back to the browser.

Defensive priority

Medium. This is a browser-execution issue with user interaction required, but it can still support session theft, content injection, or phishing within the application context if left unaddressed.

Recommended defensive actions

  • Identify whether uBidAuction 2.0.1 or related deployments are in use.
  • Review the posts/manage filtering code path for untrusted query parameters and ensure output encoding and server-side validation are applied.
  • If a vendor fix is available, prioritize deployment and retest the affected filter pages after patching.
  • Temporarily restrict access to the affected management interface if remediation cannot be applied immediately.
  • Check web and application logs for unusual requests targeting date_created, date_from, date_to, or created_at parameters.
  • Use a web application firewall or equivalent filtering as a compensating control, but do not rely on it as the only mitigation.

Evidence notes

The source corpus consists of an NVD CVE record marked received and modified on 2026-05-10, with the description explicitly stating a reflected XSS in uBidAuction 2.0.1’s posts/manage module and naming the affected parameters. The same record lists CWE-79 and references the vendor product page plus third-party advisories. Vendor attribution in the supplied metadata is low confidence and should be treated as needing review.

Official resources

Publicly listed in the supplied NVD record on 2026-05-10 with external references to the vendor page and third-party advisories. This debrief summarizes only the provided source corpus and does not independently verify the referenced public