CVE-2018-25116
Unknown Unknown - Not Provided
Cross-Site Scripting in MyBB Thread Redirect Plugin

Publication date: 2026-01-23

Last updated on: 2026-04-09

Assigner: VulnCheck

Description
MyBB Thread Redirect Plugin 0.2.1 contains a cross-site scripting vulnerability in the custom text input field for thread redirects. Attackers can inject malicious SVG scripts that will execute when other users view the thread, allowing arbitrary script execution.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-23
Last Modified
2026-04-09
Generated
2026-05-06
AI Q&A
2026-01-23
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
mybb thread_redirect 0.2.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2018-25116 is a cross-site scripting (XSS) vulnerability in the MyBB Thread Redirect Plugin version 0.2.1. It occurs because the plugin's custom text input field for thread redirects does not properly sanitize user input, allowing attackers to inject malicious SVG scripts. When other users view the affected thread, these scripts execute, enabling arbitrary script execution. [1, 2]


How can this vulnerability impact me? :

This vulnerability can allow attackers to execute arbitrary scripts in the context of users viewing the affected forum threads. This can lead to theft of user credentials, session hijacking, defacement, or other malicious actions performed on behalf of the user without their consent. [1, 2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking for the presence of the MyBB Thread Redirect Plugin version 0.2.1 on your MyBB forum installation and testing the custom text input field for thread redirects for improper input sanitization. A practical detection method is to create or monitor threads that include suspicious SVG payloads such as `<svg/onload=alert('XSS')>` in the custom text input field and observe if the script executes when the thread is viewed. There are no specific network commands provided, but manual testing of the input field or automated scanning for XSS payloads in thread redirect messages can help detect the vulnerability. [2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include disabling or uninstalling the MyBB Thread Redirect Plugin version 0.2.1 until a patched version is available. Additionally, restrict permissions so that only trusted user groups can create redirecting threads with custom text. Avoid allowing untrusted users to input custom text in thread redirects. Applying input sanitization or escaping on the custom text input field to prevent script injection is also recommended. Monitoring and removing any threads containing malicious SVG scripts can help reduce risk. [1, 3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart