Home

Description

Qool CMS contains multiple persistent cross-site scripting vulnerabilities in several administrative scripts where POST parameters are not properly sanitized before being stored and returned to users. Attackers can inject malicious JavaScript code through parameters like 'title', 'name', 'email', 'username', 'link', and 'task' in endpoints such as addnewtype, addnewdatafield, addmenu, addusergroup, addnewuserfield, adduser, addgeneraldata, and addcontentitem to execute arbitrary scripts in administrator browsers.

PUBLISHED Reserved 2026-03-15 | Published 2026-03-15 | Updated 2026-03-16 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

2.0
affected

References

www.exploit-db.com/exploits/24627 (ExploitDB-24627) exploit

www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5133.php (Vulnerability Advisory) vendor-advisory

www.vulncheck.com/...nt-cross-site-scripting-vulnerabilities (VulnCheck Advisory: Qool CMS Multiple Persistent Cross-Site Scripting Vulnerabilities) third-party-advisory

cve.org (CVE-2013-20006)

nvd.nist.gov (CVE-2013-20006)

Download JSON