source: https://www.securityfocus.com/bid/8717/info
It has been reported that one of the scripts included with GuppY is vulnerable to an HTML injection attack. The script, "postguest.php", does not perform input validation to prevent the inclusion of HTML/script content in messages posted to the portal by remote clients. The flaw is present in the implementation of the "[c]" tag, which can be used by users posting messages in the forum or in the guestbook components of GuppY portals.
The vendor is aware of the vulnerability and has released an updated version, 2,4p1, that eliminates the issue.
[c=expression(alert('unsecure'))]texte[/c]