Xoops myheader.php URL Cross Site Scripting Vulnerability

Summary
The weblinks module of XOOPS contains a file named 'myheader.php' in /modules/mylinks/ directory. The code of the module insufficently filters out user provided data. The URL parameter used by 'myheader.php' can be used to insert malicious HTML and/or JavaScript in to the web page.
Solution
Upgrade to the latest version of XOOPS.