{"id":"CVE-2019-16969","details":"In FusionPBX up to 4.5.7, the file app\\fifo_list\\fifo_interactive.php uses an unsanitized \"c\" variable coming from the URL, which is reflected in HTML, leading to XSS.","modified":"2026-03-14T09:32:12.399270Z","published":"2019-10-21T21:15:10.627Z","references":[{"type":"ADVISORY","url":"https://resp3ctblog.wordpress.com/2019/10/19/fusionpbx-xss-2/"},{"type":"FIX","url":"https://github.com/fusionpbx/fusionpbx/commit/d3679bbeface57a21f6623cbc193b04a7fc0a885"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/fusionpbx/fusionpbx","events":[{"introduced":"0"},{"fixed":"d3679bbeface57a21f6623cbc193b04a7fc0a885"}]},{"type":"GIT","repo":"https://github.com/fusionpbx/fusionpbx","events":[{"introduced":"0"},{"fixed":"d3679bbeface57a21f6623cbc193b04a7fc0a885"}]}],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"4.5.7"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-16969.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}