Skip to main content

CVE-2023-44379: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in baserproject basercms

Medium
Published: Thu Feb 22 2024 (02/22/2024, 14:47:14 UTC)
Source: CVE
Vendor/Project: baserproject
Product: basercms

Description

baserCMS is a website development framework. Prior to version 5.0.9, there is a cross-site scripting vulnerability in the site search feature. Version 5.0.9 contains a fix for this vulnerability.

AI-Powered Analysis

AILast updated: 06/21/2025, 22:40:32 UTC

Technical Analysis

CVE-2023-44379 is a cross-site scripting (XSS) vulnerability affecting baserCMS, a website development framework widely used for building and managing websites. The vulnerability exists in the site search feature of baserCMS versions prior to 5.0.9. Specifically, the issue is classified under CWE-79, which involves improper neutralization of input during web page generation. This means that user-supplied input in the search functionality is not adequately sanitized or escaped before being reflected in the web page output. As a result, an attacker can inject malicious scripts that execute in the context of the victim's browser when they view the search results page. This can lead to session hijacking, defacement, redirection to malicious sites, or theft of sensitive information such as cookies or authentication tokens. The vulnerability was addressed and fixed in version 5.0.9 of baserCMS. There are no known exploits in the wild at the time of publication, and no public proof-of-concept code has been reported. The vulnerability does not require authentication to exploit and can be triggered by any user interacting with the vulnerable search feature, making it accessible to remote attackers. Given that baserCMS is a content management system framework, the affected installations are typically websites that rely on it for content delivery and user interaction. The vulnerability impacts the confidentiality and integrity of user data and can also affect availability indirectly if exploited to deface or disrupt website functionality.

Potential Impact

For European organizations using baserCMS versions prior to 5.0.9, this vulnerability poses a moderate risk. Successful exploitation could lead to compromise of user sessions, enabling attackers to impersonate legitimate users or administrators, potentially leading to unauthorized access to sensitive data or administrative functions. This could result in data breaches, reputational damage, and loss of user trust. Additionally, attackers could use the vulnerability to inject malicious content, which might be used to distribute malware or conduct phishing attacks targeting European users. Organizations in sectors with high regulatory requirements for data protection, such as finance, healthcare, and government, could face compliance issues if user data is compromised. The vulnerability's exploitation does not directly impact system availability but could indirectly cause service disruptions through defacement or administrative lockout. Since the vulnerability is in a web-facing component, it increases the attack surface for organizations with public-facing websites built on baserCMS. The lack of known active exploitation reduces immediate risk but does not eliminate the potential for future attacks, especially if patches are not applied promptly.

Mitigation Recommendations

European organizations should immediately verify the version of baserCMS deployed on their websites and upgrade to version 5.0.9 or later, where the vulnerability has been fixed. If immediate upgrading is not feasible, organizations should implement input validation and output encoding on the search feature to neutralize potentially malicious input. Web Application Firewalls (WAFs) can be configured with rules to detect and block typical XSS attack patterns targeting the search functionality. Additionally, organizations should conduct thorough security testing, including automated scanning and manual penetration testing focused on input sanitization in the search feature. Monitoring web server logs for unusual or suspicious search queries can help detect attempted exploitation. User education on phishing risks and suspicious website behavior can mitigate the impact of successful XSS attacks. Finally, organizations should ensure that Content Security Policy (CSP) headers are implemented to restrict the execution of unauthorized scripts, reducing the impact of any injected malicious code.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2023-09-28T17:56:32.612Z
Cisa Enriched
true

Threat ID: 682d9849c4522896dcbf6b77

Added to database: 5/21/2025, 9:09:29 AM

Last enriched: 6/21/2025, 10:40:32 PM

Last updated: 7/27/2025, 12:47:24 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats