Home

Description

WonderCMS 4.3.2 contains a cross-site scripting vulnerability that allows attackers to inject malicious JavaScript through the module installation endpoint. Attackers can craft a specially designed XSS payload to install a reverse shell module and execute remote commands by tricking an authenticated administrator into accessing a malicious link.

PUBLISHED Reserved 2025-12-11 | Published 2025-12-12 | Updated 2025-12-15 | Assigner VulnCheck




HIGH: 8.6CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

Default status
unaffected

4.3.2
affected

Credits

prodigiousMind finder

References

www.exploit-db.com/exploits/51805 (ExploitDB-51805) exploit

github.com/WonderCMS/wondercms (WonderCMS Github Repository) product

www.wondercms.com/ (WonderCMS Homepage) product

www.vulncheck.com/...-code-execution-via-module-installation (VulnCheck Advisory: WonderCMS 4.3.2 Cross-Site Scripting Remote Code Execution via Module Installation) third-party-advisory

cve.org (CVE-2024-58305)

nvd.nist.gov (CVE-2024-58305)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.