PatchSiren cyber security CVE debrief
CVE-2017-6478 Mangoswebv4 Project CVE debrief
CVE-2017-6478 is a reflected cross-site scripting issue in MaNGOSWebV4’s installer endpoint. The vulnerable path is install/index.php, with the step parameter identified as the injection point. NVD marks versions before 4.0.8 as affected and rates the issue Medium (CVSS 6.1).
- Vendor
- Mangoswebv4 Project
- Product
- CVE-2017-6478
- CVSS
- MEDIUM 6.1
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-03-05
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-03-05
- Advisory updated
- 2026-05-13
Who should care
Operators of MaNGOSWebV4 instances, especially anyone exposing the installer path or running versions older than 4.0.8. Security teams should also care if the application is still reachable by users who can be tricked into opening a malicious link.
Technical summary
NVD describes CVE-2017-6478 as a reflected XSS (CWE-79) in install/index.php, triggered through the step parameter. The vulnerability affects MaNGOSWebV4 versions before 4.0.8. The published CVSS 3.1 vector is AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N, indicating network reachability, no privileges required, user interaction required, and limited confidentiality/integrity impact.
Defensive priority
Medium priority. The issue is exploitable over the network and does not require privileges, but it does require user interaction and is limited in impact by the published scoring. Upgrade to a fixed release if the product is in use.
Recommended defensive actions
- Upgrade MaNGOSWebV4 to version 4.0.8 or later, which is referenced as the fixing release in the vendor materials.
- Treat install/index.php as sensitive and ensure the installer is not unnecessarily exposed in production.
- Review any code or templating that reflects the step parameter and confirm that output encoding and input validation are in place.
- Use browser-side and application-side controls that reduce XSS impact, such as a restrictive Content Security Policy where feasible.
- If you cannot upgrade immediately, restrict access to the application and monitor for suspicious requests targeting the installer path.
Evidence notes
The supplied NVD record lists MaNGOSWebV4 versions before 4.0.8 as vulnerable and tags the weakness as CWE-79. The referenced vendor issue (#15) and release tag 4.0.8 are included in the corpus as patch/vendor references. No additional exploit detail is included here beyond the supplied metadata and references.
Official resources
-
CVE-2017-6478 CVE record
CVE.org
-
CVE-2017-6478 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
- Source reference
-
Mitigation or vendor reference
[email protected] - Exploit, Patch, Vendor Advisory
-
Mitigation or vendor reference
[email protected] - Patch, Release Notes, Vendor Advisory
Publicly disclosed on 2017-03-05, based on the supplied CVE published timestamp. The record was later modified on 2026-05-13, which should not be treated as the original issue date.