CGIWrap is a free, open-source program for running CGI securely.
CGIWrap does not filter embedded scripting commands from user-supplied input. A web user may submit a malicious link into any form which displays user-supplied input, such as guestbooks, forums, etc. Users clicking on the link will have the malicious scripting commands executed in their browser.
Stealing your Cookies issued by www.example.org, if any:
CGIWrap contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate user input upon submission to the CGIWrap application. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
Upgrade to version 3.7 or higher, as it has been reported to fix this
vulnerability. An upgrade is required as there are no known workarounds.