Home

Description

Simple CMS 2.1 contains a persistent cross-site scripting vulnerability in user input parameters that allows remote attackers to inject malicious script code. Attackers can exploit the newUser and editUser modules to inject persistent scripts that execute on user list preview, potentially leading to session hijacking and application manipulation.

PUBLISHED Reserved 2026-02-01 | Published 2026-02-01 | Updated 2026-02-02 | Assigner VulnCheck




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N
MEDIUM: 6.4CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

Problem types

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

Default status
unaffected

2.1
affected

Credits

Vulnerability-Lab [Research Team] finder

References

www.vulnerability-lab.com/get_content.php?id=2302 (Vulnerability Lab Advisory) exploit

simplephpscripts.com/simple-cms-php (Product Homepage) product

www.vulncheck.com/...ite-scripting-via-user-input-parameters (VulnCheck Advisory: Simple CMS 2.1 Persistent Cross-Site Scripting via User Input Parameters) third-party-advisory

cve.org (CVE-2021-47917)

nvd.nist.gov (CVE-2021-47917)

Download JSON