Home

Description

e107 CMS version 3.2.1 contains multiple vulnerabilities that allow cross-site scripting (XSS) attacks. The first vulnerability is a reflected XSS that occurs in the news comment functionality when authenticated users interact with the comment form. An attacker can inject malicious JavaScript code through the URL parameter that gets executed when users click outside the comment field after typing content. The second vulnerability involves an upload restriction bypass for authenticated administrators, allowing them to upload SVG files containing malicious code through the media manager's remote URL upload feature. This results in stored XSS when the uploaded SVG files are accessed. These vulnerabilities were discovered by Hubert Wojciechowski and affect the news.php and image.php components of the CMS.

PUBLISHED Reserved 2026-01-11 | Published 2026-01-13 | Updated 2026-01-21 | Assigner VulnCheck




MEDIUM: 6.1CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

Default status
unaffected

3.2.1
affected

Credits

Hubert Wojciechowski finder

References

www.exploit-db.com/exploits/50910 exploit

www.exploit-db.com/exploits/50910 (ExploitDB-50910) exploit

e107.org/ (Official Vendor Homepage) product

e107.org/download (Software Download Page) product

www.vulncheck.com/...es/e-cms-reflected-xss-via-comment-flow (VulnCheck Advisory: e107 CMS v3.2.1 - Reflected XSS via Comment Flow) third-party-advisory

cve.org (CVE-2022-50905)

nvd.nist.gov (CVE-2022-50905)

Download JSON