{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T01:02:25.581","vulnerabilities":[{"cve":{"id":"CVE-2022-50905","sourceIdentifier":"disclosure@vulncheck.com","published":"2026-01-13T23:15:53.083","lastModified":"2026-01-21T15:16:05.383","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"e107 CMS version 3.2.1 contains multiple vulnerabilities that allow cross-site scripting (XSS) attacks. The first vulnerability is a reflected XSS that occurs in the news comment functionality when authenticated users interact with the comment form. An attacker can inject malicious JavaScript code through the URL parameter that gets executed when users click outside the comment field after typing content. The second vulnerability involves an upload restriction bypass for authenticated administrators, allowing them to upload SVG files containing malicious code through the media manager's remote URL upload feature. This results in stored XSS when the uploaded SVG files are accessed. These vulnerabilities were discovered by Hubert Wojciechowski and affect the news.php and image.php components of the CMS."},{"lang":"es","value":"La versión 3.2.1 de e107 CMS contiene múltiples vulnerabilidades que permiten ataques de cross-site scripting (XSS). La primera vulnerabilidad es un XSS reflejado que ocurre en la funcionalidad de comentarios de noticias cuando usuarios autenticados interactúan con el formulario de comentarios. Un atacante puede inyectar código JavaScript malicioso a través del parámetro de URL que se ejecuta cuando los usuarios hacen clic fuera del campo de comentario después de escribir contenido. La segunda vulnerabilidad implica una omisión de restricción de carga para administradores autenticados, permitiéndoles cargar archivos SVG que contienen código malicioso a través de la función de carga de URL remota del gestor de medios. Esto resulta en un XSS almacenado cuando se accede a los archivos SVG cargados. Estas vulnerabilidades fueron descubiertas por Hubert Wojciechowski y afectan a los componentes news.PHP e image.PHP del CMS."}],"metrics":{"cvssMetricV31":[{"source":"disclosure@vulncheck.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}]},"weaknesses":[{"source":"disclosure@vulncheck.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:e107:e107:3.2.1:*:*:*:*:*:*:*","matchCriteriaId":"B1CF95DE-65CF-490D-9817-616CF704B16B"}]}]}],"references":[{"url":"https://e107.org/","source":"disclosure@vulncheck.com","tags":["Product"]},{"url":"https://e107.org/download","source":"disclosure@vulncheck.com","tags":["Product"]},{"url":"https://www.exploit-db.com/exploits/50910","source":"disclosure@vulncheck.com","tags":["Exploit","Third Party Advisory","VDB Entry"]},{"url":"https://www.vulncheck.com/advisories/e-cms-reflected-xss-via-comment-flow","source":"disclosure@vulncheck.com","tags":["Third Party Advisory"]},{"url":"https://www.exploit-db.com/exploits/50910","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Third Party Advisory","VDB Entry"]}]}}]}