Description
A vulnerability was detected in MaxSite CMS up to 109.3. This affects an unknown part of the component Redirect Plugin. The manipulation of the argument f_all/f_all404 results in cross site scripting. The attack can be launched remotely. The exploit is now public and may be used. Upgrading to version 109.4 is able to mitigate this issue. The patch is identified as 8a3946bd0a54bfb72a4d57179fcd253f2c550cd7. You should upgrade the affected component. The vendor was informed early about this issue. They classify it as a "Self-XSS". They deployed a countermeasure: "Nevertheless, we consider this a violation of secure coding standards. The lack of filtering via `htmlspecialchars()` has already been fixed in the latest patch to prevent incorrect data display."
Problem types
Product status
109.1
109.2
109.3
109.4
Timeline
| 2026-04-25: | Advisory disclosed |
| 2026-04-25: | VulDB entry created |
| 2026-04-25: | VulDB entry last update |
Credits
konchan (VulDB User)
VulDB CNA Team
References
vuldb.com/vuln/359593 (VDB-359593 | MaxSite CMS Redirect Plugin cross site scripting)
vuldb.com/vuln/359593/cti (VDB-359593 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/submit/796737 (Submit #796737 | MaxSite CMS 109.3 Cross Site Scripting)
github.com/...red XSS-in-redirect-plugin-maxsite-cms.pdf.pdf
github.com/...ommit/8a3946bd0a54bfb72a4d57179fcd253f2c550cd7
github.com/maxsite/cms/releases/tag/v109
github.com/maxsite/cms/