Home

Description

SVXportal version 2.5 and prior contain a stored cross-site scripting vulnerability in the user profile update workflow (user_settings.php submitting to admin/update_user.php). Authenticated users can store malicious HTML/JavaScript in fields such as Firstname, lastname, email, and image_url, which are later rendered without adequate output encoding in the administrator interface (admin/users.php), resulting in JavaScript execution in an administrator's browser when the affected page is viewed.

PUBLISHED Reserved 2026-02-19 | Published 2026-02-20 | Updated 2026-02-20 | Assigner VulnCheck




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N

MEDIUM: 6.1CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Problem types

CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')

Product status

Default status
unknown

Any version
affected

Credits

philopentest finder

References

github.com/...lv/SVXportal/blob/master/admin/update_user.php product

www.vulncheck.com/...portal-admin-update-user-php-stored-xss third-party-advisory

cve.org (CVE-2026-27506)

nvd.nist.gov (CVE-2026-27506)

Download JSON