CVE-2022-50905

9.8 CRITICAL
Published: January 13, 2026 Modified: January 21, 2026
View on NVD

Description

e107 CMS version 3.2.1 contains multiple vulnerabilities that allow cross-site scripting (XSS) attacks. The first vulnerability is a reflected XSS that occurs in the news comment functionality when authenticated users interact with the comment form. An attacker can inject malicious JavaScript code through the URL parameter that gets executed when users click outside the comment field after typing content. The second vulnerability involves an upload restriction bypass for authenticated administrators, allowing them to upload SVG files containing malicious code through the media manager's remote URL upload feature. This results in stored XSS when the uploaded SVG files are accessed. These vulnerabilities were discovered by Hubert Wojciechowski and affect the news.php and image.php components of the CMS.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://e107.org/
Source: disclosure@vulncheck.com
Product
https://e107.org/download
Source: disclosure@vulncheck.com
Product
https://www.exploit-db.com/exploits/50910
Source: disclosure@vulncheck.com
Exploit Third Party Advisory VDB Entry
https://www.vulncheck.com/advisories/e-cms-reflected-xss-via-comment-flow
Source: disclosure@vulncheck.com
Third Party Advisory
https://www.exploit-db.com/exploits/50910
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Exploit Third Party Advisory VDB Entry

5 reference(s) from NVD

Quick Stats

CVSS v3 Score
9.8 / 10.0
EPSS (Exploit Probability)
0.1%
18th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

e107