PatchSiren

PatchSiren cyber security CVE debrief

CVE-2017-6390 Soruly CVE debrief

CVE-2017-6390 is a cross-site scripting vulnerability in whatanime.ga that could let an attacker inject HTML and script into the site’s browser context. The issue is described as insufficient filtration of user-supplied data passed to whatanime.ga-master/index.php, and the available references point to a patch commit and related issue discussion.

Vendor
Soruly
Product
CVE-2017-6390
CVSS
MEDIUM 6.1
CISA KEV
Not listed in stored evidence
Original CVE published
2017-03-02
Original CVE updated
2026-05-13
Advisory published
2017-03-02
Advisory updated
2026-05-13

Who should care

Administrators, developers, and users of whatanime.ga deployments should care, especially anyone running versions predating the referenced patch commit. Any service that accepts user-controlled input into index.php is directly in scope for review.

Technical summary

NVD classifies this issue as CWE-79 with CVSS 3.0 vector CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N. The vulnerability is tied to inadequate input filtration in whatanime.ga-master/index.php, enabling arbitrary HTML/script execution in the context of the vulnerable website. The supplied record and references indicate remediation in the referenced Git commit.

Defensive priority

Medium

Recommended defensive actions

  • Update to a version that includes the referenced patch commit c334dd8499a681587dd4199e90b0aa0eba814c1d or later.
  • Review index.php and any related request-handling code for untrusted input that is rendered into HTML without encoding.
  • Apply output encoding and server-side validation for all user-controlled fields used in page rendering.
  • Add regression tests that verify special characters and markup are safely escaped in the affected flow.
  • If you cannot patch immediately, restrict exposure of the affected endpoint and monitor for unexpected script or markup injection attempts.

Evidence notes

The supplied NVD record states that the issue is in whatanime.ga before commit c334dd8499a681587dd4199e90b0aa0eba814c1d and that insufficient filtration of user-supplied data passed to whatanime.ga-master/index.php allows arbitrary HTML and script execution in the browser context of the vulnerable website. NVD also maps the weakness to CWE-79 and provides a CVSS 3.0 vector of AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N. The reference list includes a SecurityFocus BID entry, a patch commit, and an issue discussion; this debrief does not rely on any unstated contents from those links.

Official resources

CVE published 2017-03-02T06:59:00.293Z; the NVD record was modified on 2026-05-13T00:24:29.033Z. The timing context in this debrief uses the supplied CVE published date and associated source metadata, not any generation date.