Hello dear XSS bored audience, the PHP based social networking engine Elgg [1], versions 1.8.12 and 1.7.16 and earlier, bears a persistent script injection vulnerability in its core module "Twitter widget", which allows for XSS attacks. On installations which have the Twitter widget activated (disabled by default, but in use on many installations), any authenticated user may add the Twitter to their activity / dashboard page. Editing its configuration allows the user to set the twitter_username parameter. The value stored in this parameter will be echoed without sanitation [2] when this page is viewed by any other user, authenticated or not. For mitigation, the Twitter widget can be disabled by a site admin (in the admin backend's plugin configuration area). According to changes committed [3] to their Git repository Elgg developers will provide a fix for this issue in the upcoming (?) 1.8.13 release. This was originally reported by Moritz Naumann http://moritz-naumann.com on January 17, to security[at]elgg.org, and got me a prompt vendor reply. Coordination of advisory release is something to improve upon next time. A CVE ID has, to my knowledge, not yet been assigned. Secunia has assigned it SA52007. Have fun, Moritz [1] http://elgg.org/ [2] http://github.com/Elgg/Elgg/commit/a74a88501c41e89c8bcd7fc650ae2f8cc0a5003d#L2L21 [3] http://github.com/Elgg/Elgg/commit/19dc507c2fccb378be2a44a762edf6c1e7afa334#L0R11