CVE-2026-2200: Cross Site Scripting in heyewei JFinalCMS
A weakness has been identified in heyewei JFinalCMS 5.0.0. This affects an unknown function of the file /admin/admin/save of the component API Endpoint. Executing a manipulation can lead to cross site scripting. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.
AI Analysis
Technical Summary
CVE-2026-2200 identifies a cross-site scripting vulnerability in the heyewei JFinalCMS content management system, specifically version 5.0.0. The vulnerability resides in the /admin/admin/save API endpoint, which is part of the administrative interface. An attacker can craft malicious input that, when processed by this endpoint, results in the injection of executable scripts into the web application context. This XSS flaw can be exploited remotely but requires the attacker to have high privileges (PR:H) and some user interaction (UI:P), such as tricking an administrator into clicking a crafted link or submitting a malicious form. The vulnerability does not require authentication bypass but does require the attacker to have access to the administrative functions, limiting the attack surface. The CVSS vector indicates no impact on confidentiality (VC:N) or availability (VA:N), but a low impact on integrity (VI:L) due to script injection. The vulnerability is exploitable with low attack complexity (AC:L) and no scope change (S:U). Although no active exploits have been reported in the wild, the availability of proof-of-concept code increases the risk of future exploitation. The lack of official patches or mitigation guidance from the vendor at the time of publication necessitates proactive defensive measures by administrators. The vulnerability could be leveraged to hijack administrator sessions, perform unauthorized actions, or deface the CMS interface, undermining the trustworthiness of affected websites.
Potential Impact
The primary impact of CVE-2026-2200 is on the integrity and confidentiality of administrative sessions within JFinalCMS 5.0.0 environments. Successful exploitation can lead to execution of arbitrary scripts in the context of the administrator's browser, enabling session hijacking, credential theft, or unauthorized administrative actions. This can result in website defacement, data manipulation, or further compromise of backend systems. Since the vulnerability requires high privileges and user interaction, the risk is somewhat contained but still significant for organizations relying on JFinalCMS for critical web content management. Attackers could use this vector to pivot into deeper network layers or disrupt business operations by altering website content. The public availability of exploit code increases the likelihood of opportunistic attacks, especially against less vigilant or unpatched installations. Organizations with exposed administrative interfaces accessible over the internet are particularly vulnerable. The impact on availability is minimal, but the reputational damage and potential data breaches pose substantial risks.
Mitigation Recommendations
To mitigate CVE-2026-2200, organizations should first verify if they are running heyewei JFinalCMS version 5.0.0 and restrict access to the /admin/admin/save endpoint to trusted administrative users only. Implement strict input validation and output encoding on all user-supplied data processed by this endpoint to prevent script injection. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the browser. Use multi-factor authentication (MFA) for administrative accounts to reduce the risk of credential compromise. Monitor administrative access logs for suspicious activity and implement network-level controls such as IP whitelisting or VPN access for administration. If vendor patches become available, apply them promptly. Until patches are released, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block XSS payloads targeting the vulnerable endpoint. Educate administrators about phishing and social engineering risks to minimize user interaction exploitation. Regularly audit and update CMS components to maintain security hygiene.
Affected Countries
China, United States, India, Germany, Brazil, Russia, South Korea, Japan, United Kingdom, France
CVE-2026-2200: Cross Site Scripting in heyewei JFinalCMS
Description
A weakness has been identified in heyewei JFinalCMS 5.0.0. This affects an unknown function of the file /admin/admin/save of the component API Endpoint. Executing a manipulation can lead to cross site scripting. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-2200 identifies a cross-site scripting vulnerability in the heyewei JFinalCMS content management system, specifically version 5.0.0. The vulnerability resides in the /admin/admin/save API endpoint, which is part of the administrative interface. An attacker can craft malicious input that, when processed by this endpoint, results in the injection of executable scripts into the web application context. This XSS flaw can be exploited remotely but requires the attacker to have high privileges (PR:H) and some user interaction (UI:P), such as tricking an administrator into clicking a crafted link or submitting a malicious form. The vulnerability does not require authentication bypass but does require the attacker to have access to the administrative functions, limiting the attack surface. The CVSS vector indicates no impact on confidentiality (VC:N) or availability (VA:N), but a low impact on integrity (VI:L) due to script injection. The vulnerability is exploitable with low attack complexity (AC:L) and no scope change (S:U). Although no active exploits have been reported in the wild, the availability of proof-of-concept code increases the risk of future exploitation. The lack of official patches or mitigation guidance from the vendor at the time of publication necessitates proactive defensive measures by administrators. The vulnerability could be leveraged to hijack administrator sessions, perform unauthorized actions, or deface the CMS interface, undermining the trustworthiness of affected websites.
Potential Impact
The primary impact of CVE-2026-2200 is on the integrity and confidentiality of administrative sessions within JFinalCMS 5.0.0 environments. Successful exploitation can lead to execution of arbitrary scripts in the context of the administrator's browser, enabling session hijacking, credential theft, or unauthorized administrative actions. This can result in website defacement, data manipulation, or further compromise of backend systems. Since the vulnerability requires high privileges and user interaction, the risk is somewhat contained but still significant for organizations relying on JFinalCMS for critical web content management. Attackers could use this vector to pivot into deeper network layers or disrupt business operations by altering website content. The public availability of exploit code increases the likelihood of opportunistic attacks, especially against less vigilant or unpatched installations. Organizations with exposed administrative interfaces accessible over the internet are particularly vulnerable. The impact on availability is minimal, but the reputational damage and potential data breaches pose substantial risks.
Mitigation Recommendations
To mitigate CVE-2026-2200, organizations should first verify if they are running heyewei JFinalCMS version 5.0.0 and restrict access to the /admin/admin/save endpoint to trusted administrative users only. Implement strict input validation and output encoding on all user-supplied data processed by this endpoint to prevent script injection. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the browser. Use multi-factor authentication (MFA) for administrative accounts to reduce the risk of credential compromise. Monitor administrative access logs for suspicious activity and implement network-level controls such as IP whitelisting or VPN access for administration. If vendor patches become available, apply them promptly. Until patches are released, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block XSS payloads targeting the vulnerable endpoint. Educate administrators about phishing and social engineering risks to minimize user interaction exploitation. Regularly audit and update CMS components to maintain security hygiene.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-07T17:40:53.635Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69893c684b57a58fa1f0def8
Added to database: 2/9/2026, 1:46:16 AM
Last enriched: 2/23/2026, 9:06:23 PM
Last updated: 3/25/2026, 8:39:22 AM
Views: 68
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.