PatchSiren

PatchSiren cyber security CVE debrief

CVE-2017-6480 Groovel Project CVE debrief

CVE-2017-6480 describes a reflected cross-site scripting (XSS) vulnerability in groovel/cmsgroovel before 3.3.7-beta. The issue is in commons/browser.php and involves the path parameter, allowing attacker-controlled input to be reflected into a victim’s browser. Because exploitation requires user interaction, the risk is typically highest where users can be lured into opening a crafted link or visiting a malicious page.

Vendor
Groovel Project
Product
CVE-2017-6480
CVSS
MEDIUM 6.1
CISA KEV
Not listed in stored evidence
Original CVE published
2017-03-05
Original CVE updated
2026-05-13
Advisory published
2017-03-05
Advisory updated
2026-05-13

Who should care

Administrators, developers, and security teams running groovel/cmsgroovel versions earlier than 3.3.7-beta should treat this as relevant. It is especially important for any deployment where users can access the affected browser endpoint over the network.

Technical summary

NVD classifies the issue as CWE-79 (Improper Neutralization of Input During Web Page Generation) with a CVSS 3.0 vector of AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N. The vulnerable surface is commons/browser.php, where the path parameter can be reflected in a way that enables script execution in the context of the victim’s session. NVD’s vulnerable version range indicates affected cmsgroovel builds up to and including 3.3.6, with 3.3.7-beta referenced as the fixed release.

Defensive priority

Medium

Recommended defensive actions

  • Upgrade groovel/cmsgroovel to 3.3.7-beta or a later fixed release referenced by the vendor.
  • Review commons/browser.php for unsafe reflection of the path parameter and apply strict output encoding.
  • Add server-side input validation and context-aware output escaping for any user-controlled values rendered into HTML.
  • Check application logs and web access logs for suspicious requests targeting commons/browser.php, especially crafted path values.
  • If immediate patching is not possible, restrict exposure of the affected application to trusted users and networks until remediation is complete.

Evidence notes

The official NVD entry identifies this as CVE-2017-6480, maps it to CWE-79, and lists the vulnerable cpe range through version 3.3.6. The MITRE-cited vendor references point to a GitHub issue and the 3.3.7-beta release notes, supporting the remediation version and the affected component path. The CVSS vector indicates network reachability but requires user interaction, consistent with reflected XSS behavior.

Official resources

Publicly published on 2017-03-05. The NVD record was later modified on 2026-05-13, but the vulnerability’s disclosure date remains 2017-03-05.