Home

Description

SVXportal version 2.5 and prior contain a stored cross-site scripting vulnerability in the user registration workflow (index.php submitting to admin/user_action.php). User-supplied fields such as Firstname, lastname, and email are stored in the backend database without adequate output encoding and are later rendered in the administrator interface (admin/users.php), allowing an unauthenticated remote attacker to inject arbitrary JavaScript that executes in an administrator's browser upon viewing the affected page.

PUBLISHED Reserved 2026-02-19 | Published 2026-02-20 | Updated 2026-02-20 | Assigner VulnCheck




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N

MEDIUM: 6.1CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Problem types

CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')

Product status

Default status
unknown

Any version
affected

Credits

philopentest finder

References

github.com/...lv/SVXportal/blob/master/admin/user_action.php product

www.vulncheck.com/...portal-admin-user-action-php-stored-xss third-party-advisory

cve.org (CVE-2026-27505)

nvd.nist.gov (CVE-2026-27505)

Download JSON