PatchSiren

PatchSiren cyber security CVE debrief

CVE-2017-6478 Mangoswebv4 Project CVE debrief

CVE-2017-6478 is a reflected cross-site scripting issue in MaNGOSWebV4’s installer endpoint. The vulnerable path is install/index.php, with the step parameter identified as the injection point. NVD marks versions before 4.0.8 as affected and rates the issue Medium (CVSS 6.1).

Vendor
Mangoswebv4 Project
Product
CVE-2017-6478
CVSS
MEDIUM 6.1
CISA KEV
Not listed in stored evidence
Original CVE published
2017-03-05
Original CVE updated
2026-05-13
Advisory published
2017-03-05
Advisory updated
2026-05-13

Who should care

Operators of MaNGOSWebV4 instances, especially anyone exposing the installer path or running versions older than 4.0.8. Security teams should also care if the application is still reachable by users who can be tricked into opening a malicious link.

Technical summary

NVD describes CVE-2017-6478 as a reflected XSS (CWE-79) in install/index.php, triggered through the step parameter. The vulnerability affects MaNGOSWebV4 versions before 4.0.8. The published CVSS 3.1 vector is AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N, indicating network reachability, no privileges required, user interaction required, and limited confidentiality/integrity impact.

Defensive priority

Medium priority. The issue is exploitable over the network and does not require privileges, but it does require user interaction and is limited in impact by the published scoring. Upgrade to a fixed release if the product is in use.

Recommended defensive actions

  • Upgrade MaNGOSWebV4 to version 4.0.8 or later, which is referenced as the fixing release in the vendor materials.
  • Treat install/index.php as sensitive and ensure the installer is not unnecessarily exposed in production.
  • Review any code or templating that reflects the step parameter and confirm that output encoding and input validation are in place.
  • Use browser-side and application-side controls that reduce XSS impact, such as a restrictive Content Security Policy where feasible.
  • If you cannot upgrade immediately, restrict access to the application and monitor for suspicious requests targeting the installer path.

Evidence notes

The supplied NVD record lists MaNGOSWebV4 versions before 4.0.8 as vulnerable and tags the weakness as CWE-79. The referenced vendor issue (#15) and release tag 4.0.8 are included in the corpus as patch/vendor references. No additional exploit detail is included here beyond the supplied metadata and references.

Official resources

Publicly disclosed on 2017-03-05, based on the supplied CVE published timestamp. The record was later modified on 2026-05-13, which should not be treated as the original issue date.