PatchSiren cyber security CVE debrief
CVE-2017-6488 Epesi CVE debrief
CVE-2017-6488 is a medium-severity cross-site scripting issue in EPESI 1.8.1.1. User-controlled parameters passed to save_filters.php were not filtered adequately, allowing an attacker to inject HTML or script that executes in a victim's browser in the context of the vulnerable site.
- Vendor
- Epesi
- Product
- CVE-2017-6488
- CVSS
- MEDIUM 6.1
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-03-05
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-03-05
- Advisory updated
- 2026-05-13
Who should care
EPESI administrators, application security teams, and anyone operating or maintaining EPESI 1.8.1.1 deployments should review this issue, especially if the application is exposed to untrusted users or if links to the affected endpoint can be shared broadly.
Technical summary
NVD describes CVE-2017-6488 as multiple XSS issues in EPESI 1.8.1.1 caused by insufficient filtration of the visible, tab, and cid parameters sent to EPESI-master/modules/Utils/RecordBrowser/Filters/save_filters.php. The weakness is classified as CWE-79. NVD assigns CVSS 3.1 vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N, indicating a network-reachable issue that requires user interaction and can impact confidentiality and integrity through script execution in the browser context.
Defensive priority
Medium. The issue is publicly disclosed and web-facing, but exploitation requires user interaction. Prioritize if EPESI is internet-accessible or handles sensitive user sessions.
Recommended defensive actions
- Review EPESI deployments for version 1.8.1.1 and confirm whether a vendor fix or patched release is available.
- Apply the referenced patch or vendor guidance associated with the GitHub issue reference before exposing the affected endpoint to users.
- Validate that user-supplied parameters such as visible, tab, and cid are properly filtered before use and that any reflected output is safely encoded.
- Restrict access to the affected application paths where possible until remediation is complete.
- Monitor for suspicious links or requests targeting save_filters.php and for unexpected script execution symptoms in user sessions.
Evidence notes
This debrief is based on the NVD record for CVE-2017-6488 and the CVE description supplied in the source corpus. The record lists EPESI 1.8.1.1 as vulnerable, identifies CWE-79, and links to a SecurityFocus advisory and a GitHub issue tagged as exploit and patch. No additional claims are made beyond the supplied sources.
Official resources
-
CVE-2017-6488 CVE record
CVE.org
-
CVE-2017-6488 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Exploit, Patch
Publicly disclosed on 2017-03-05T20:59:00.527Z. The NVD record was last modified on 2026-05-13T00:24:29.033Z.