CVE-2008-5186

Source
https://nvd.nist.gov/vuln/detail/CVE-2008-5186
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2008-5186.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2008-5186
Downstream
Published
2008-11-21T02:30:00Z
Modified
2025-08-09T20:01:26Z
Summary
[none]
Details

The setlanguagepath function in geshi.php in Generic Syntax Highlighter (GeSHi) before 1.0.8.1 might allow remote attackers to conduct file inclusion attacks via crafted inputs that influence the default language path ($path variable). NOTE: this issue has been disputed by a vendor, stating that only a static value is used, so this is not a vulnerability in GeSHi. Separate CVE identifiers would be created for web applications that integrate GeSHi in a way that allows control of the default language path

Database specific
{
    "isDisputed": true
}
References

Affected packages