High-Tech Bridge has discovered multiple vulnerabilities in Baby Gekko, which can be exploited by malicious people to conduct cross-site scripting attacks.
1) Input passed via the "username" and "password" POST parameters to index.php is not properly sanitised in blocks/loginbox/loginbox.template.php before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
Successful exploitation requires the loginbox block to be enabled (disable by default).
2) Input passed via the "id" parameter to admin/index.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
The vulnerabilities are confirmed in version 1.2.2e. Prior versions may also be affected.