Home

Description

GetSimpleCMS Community Edition (CE) version 3.3.16 contains a stored cross-site scripting (XSS) vulnerability in the Theme to Components functionality within components.php. User-supplied input provided to the "slug" field of a component is stored without proper output encoding. While other fields are sanitized using safe_slash_html(), the slug parameter is written to XML and later rendered in the administrative interface without sanitation, resulting in persistent execution of arbitrary JavaScript. An authenticated administrator can inject malicious script content that executes whenever the affected Components page is viewed by any authenticated user, enabling session hijacking, unauthorized administrative actions, and persistent compromise of the CMS administrative interface.

PUBLISHED Reserved 2026-02-13 | Published 2026-02-24 | Updated 2026-02-24 | Assigner VulnCheck




MEDIUM: 4.8CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N

Problem types

CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')

Product status

Default status
unknown

3.3.16
affected

3.3.22
unaffected

Credits

Beatriz Fresno Naumova finder

VulnCheck coordinator

References

github.com/...CMS-CE/security/advisories/GHSA-95f7-vm92-8gpx issue-tracking

github.com/...pleCMS-CE/GetSimpleCMS-CE/releases/tag/v3.3.22 release-notes patch

getsimple-ce.ovh/ product

www.vulncheck.com/...plecms-ce-stored-xss-via-components-php third-party-advisory

cve.org (CVE-2026-26351)

nvd.nist.gov (CVE-2026-26351)

Download JSON