Home / CVE DB / CVE-2009-4119
Standard
Vulnerability Identifier

CVE-2009-4119

2009-12-01
Severity Assessment
LOW
CVSS v3.x Score
Clinical Analysis (Description)

Cross-site scripting (XSS) vulnerability in Feed Element Mapper module 5.x before 5.x-1.3, 6.x before 6.x-1.3, and 6.x-2.0-alpha before 6.x-2.0-alpha4 for Drupal allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Vector Sequencing

Attack Parameters

Impact Consequences

Technical Impact

CVSS v2 Score (Legacy)
4.3

For backward compatibility

EPSS Probability
0.40%

Percentile: 61.0%

Weakness Classification

CWE-CWE-79

Affected Population

Affected Configurations

Total: 23 detected entries

Software List Scrollable
al
feed_element_mapper
Vendor: alex_barth • v5.x-1.0-beta2
al
feed_element_mapper
Vendor: alex_barth • v5.x-1.0
al
feed_element_mapper
Vendor: alex_barth • v6.x-1.0-beta5
al
feed_element_mapper
Vendor: alex_barth • v6.x-1.0-beta12
al
feed_element_mapper
Vendor: alex_barth • v6.x-1.0-beta1
al
feed_element_mapper
Vendor: alex_barth • v5.x-1.0-beta5
al
feed_element_mapper
Vendor: alex_barth • v6.x-1.x-dev
al
feed_element_mapper
Vendor: alex_barth • v6.x-1.0-beta4
al
feed_element_mapper
Vendor: alex_barth • v6.x-1.0-beta9
al
feed_element_mapper
Vendor: alex_barth • v6.x-1.0-beta2
al
feed_element_mapper
Vendor: alex_barth • v6.x-1.0-beta11
al
feed_element_mapper
Vendor: alex_barth • v5.x-1.1
al
feed_element_mapper
Vendor: alex_barth • v5.x-1.0-beta6
al
feed_element_mapper
Vendor: alex_barth • v5.x-1.x-dev
al
feed_element_mapper
Vendor: alex_barth • v5.x-1.0-beta1
al
feed_element_mapper
Vendor: alex_barth • v6.x-1.0-beta3
al
feed_element_mapper
Vendor: alex_barth • v6.x-1.0-beta7
al
feed_element_mapper
Vendor: alex_barth • v5.x-1.0-beta7
al
feed_element_mapper
Vendor: alex_barth • v5.x-1.0-beta4
al
feed_element_mapper
Vendor: alex_barth • v6.x-1.0-alpha1
al
feed_element_mapper
Vendor: alex_barth • v6.x-1.0-beta6
al
feed_element_mapper
Vendor: alex_barth • v6.x-1.0-beta10
al
feed_element_mapper
Vendor: alex_barth • v5.x-1.0-beta3
Timeline

Time Line

PUBLICATION
01 Dec 2009
MODIFICATION
09 Apr 2025
Impact Statistics

Key Metrics

CVSS Score
LOW
Products
23
Affected
Remediation Protocol

Recommended Solution

No automatic solution found. Check vendor references.
Patch Library
No direct patch listed in database.
Recommended Actions for Administrators

Immediate Action Plan

1. Inventory

Identify all affected systems in your infrastructure.

2. Assessment

Assess exposure and criticality for your organization.

3. Mitigation

Apply patches or available workarounds.

4. Verification

Test and confirm effectiveness of applied measures.