Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2200: Cross Site Scripting in heyewei JFinalCMS

0
Medium
VulnerabilityCVE-2026-2200cvecve-2026-2200
Published: Mon Feb 09 2026 (02/09/2026, 01:02:05 UTC)
Source: CVE Database V5
Vendor/Project: heyewei
Product: JFinalCMS

Description

A weakness has been identified in heyewei JFinalCMS 5.0.0. This affects an unknown function of the file /admin/admin/save of the component API Endpoint. Executing a manipulation can lead to cross site scripting. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 21:06:23 UTC

Technical Analysis

CVE-2026-2200 identifies a cross-site scripting vulnerability in the heyewei JFinalCMS content management system, specifically version 5.0.0. The vulnerability resides in the /admin/admin/save API endpoint, which is part of the administrative interface. An attacker can craft malicious input that, when processed by this endpoint, results in the injection of executable scripts into the web application context. This XSS flaw can be exploited remotely but requires the attacker to have high privileges (PR:H) and some user interaction (UI:P), such as tricking an administrator into clicking a crafted link or submitting a malicious form. The vulnerability does not require authentication bypass but does require the attacker to have access to the administrative functions, limiting the attack surface. The CVSS vector indicates no impact on confidentiality (VC:N) or availability (VA:N), but a low impact on integrity (VI:L) due to script injection. The vulnerability is exploitable with low attack complexity (AC:L) and no scope change (S:U). Although no active exploits have been reported in the wild, the availability of proof-of-concept code increases the risk of future exploitation. The lack of official patches or mitigation guidance from the vendor at the time of publication necessitates proactive defensive measures by administrators. The vulnerability could be leveraged to hijack administrator sessions, perform unauthorized actions, or deface the CMS interface, undermining the trustworthiness of affected websites.

Potential Impact

The primary impact of CVE-2026-2200 is on the integrity and confidentiality of administrative sessions within JFinalCMS 5.0.0 environments. Successful exploitation can lead to execution of arbitrary scripts in the context of the administrator's browser, enabling session hijacking, credential theft, or unauthorized administrative actions. This can result in website defacement, data manipulation, or further compromise of backend systems. Since the vulnerability requires high privileges and user interaction, the risk is somewhat contained but still significant for organizations relying on JFinalCMS for critical web content management. Attackers could use this vector to pivot into deeper network layers or disrupt business operations by altering website content. The public availability of exploit code increases the likelihood of opportunistic attacks, especially against less vigilant or unpatched installations. Organizations with exposed administrative interfaces accessible over the internet are particularly vulnerable. The impact on availability is minimal, but the reputational damage and potential data breaches pose substantial risks.

Mitigation Recommendations

To mitigate CVE-2026-2200, organizations should first verify if they are running heyewei JFinalCMS version 5.0.0 and restrict access to the /admin/admin/save endpoint to trusted administrative users only. Implement strict input validation and output encoding on all user-supplied data processed by this endpoint to prevent script injection. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the browser. Use multi-factor authentication (MFA) for administrative accounts to reduce the risk of credential compromise. Monitor administrative access logs for suspicious activity and implement network-level controls such as IP whitelisting or VPN access for administration. If vendor patches become available, apply them promptly. Until patches are released, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block XSS payloads targeting the vulnerable endpoint. Educate administrators about phishing and social engineering risks to minimize user interaction exploitation. Regularly audit and update CMS components to maintain security hygiene.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-07T17:40:53.635Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69893c684b57a58fa1f0def8

Added to database: 2/9/2026, 1:46:16 AM

Last enriched: 2/23/2026, 9:06:23 PM

Last updated: 3/25/2026, 8:39:22 AM

Views: 68

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses