Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24351: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in PluXml PluXml CMS

0
Medium
VulnerabilityCVE-2026-24351cvecve-2026-24351cwe-79
Published: Fri Feb 27 2026 (02/27/2026, 11:35:23 UTC)
Source: CVE Database V5
Vendor/Project: PluXml
Product: PluXml CMS

Description

CVE-2026-24351 is a stored Cross-site Scripting (XSS) vulnerability in PluXml CMS affecting versions 5. 8. 21 and 5. 9. 0-rc7. An attacker with editing privileges can inject malicious HTML and JavaScript into static pages, which executes when users visit the compromised page. The vulnerability arises from improper input neutralization during web page generation (CWE-79). Exploitation does not require user authentication beyond editing rights, and no user interaction is needed to trigger the payload once the page is visited. The vendor has not provided detailed information or patches, and other versions may also be vulnerable. The CVSS 4.

AI-Powered Analysis

AILast updated: 02/27/2026, 11:58:05 UTC

Technical Analysis

CVE-2026-24351 identifies a stored Cross-site Scripting (XSS) vulnerability in the PluXml Content Management System (CMS), specifically within the static pages editing functionality. This vulnerability is classified under CWE-79, which involves improper neutralization of input during web page generation, allowing malicious scripts to be injected and stored on the server. Attackers who possess editing privileges can exploit this flaw by embedding arbitrary HTML and JavaScript code into static pages. When other users or visitors access these compromised pages, the injected scripts execute in their browsers, potentially leading to session hijacking, defacement, or redirection to malicious sites. The vulnerability has been confirmed in versions 5.8.21 and 5.9.0-rc7; however, the vendor has not disclosed the full range of affected versions or provided patches. The CVSS 4.0 base score of 5.1 reflects a medium severity level, considering the network attack vector, low attack complexity, no required authentication beyond editing privileges, and no user interaction needed to trigger the exploit. The scope is limited to users with editing rights, but the impact extends to any visitor of the infected pages. No known exploits have been detected in the wild, but the lack of vendor response and patch availability increases the risk for organizations relying on these versions of PluXml CMS.

Potential Impact

The primary impact of this vulnerability is the potential execution of malicious scripts in the browsers of users visiting compromised static pages. This can lead to theft of sensitive information such as session cookies, enabling attackers to impersonate legitimate users or administrators. It can also facilitate website defacement, phishing attacks, or distribution of malware. Since the vulnerability requires editing privileges, the risk is elevated in environments where multiple users have content editing access, especially if those accounts are compromised or malicious insiders exist. The absence of vendor patches prolongs exposure and increases the likelihood of exploitation over time. Organizations using affected PluXml CMS versions may suffer reputational damage, data breaches, and loss of user trust if the vulnerability is exploited. The medium CVSS score reflects moderate risk, but the real-world impact depends on the deployment context and privilege management practices.

Mitigation Recommendations

Organizations should immediately audit and restrict editing privileges to trusted personnel only, minimizing the number of users who can modify static pages. Implement strict input validation and output encoding on all user-supplied content within the CMS, especially in static page editors, to neutralize potentially malicious scripts. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. Regularly monitor static page content for unexpected or suspicious HTML/JavaScript injections. If possible, upgrade to a patched or newer version of PluXml CMS once available. In the interim, consider disabling or restricting the static pages editing functionality to reduce attack surface. Conduct security awareness training for editors to recognize social engineering attempts that could lead to privilege abuse. Finally, maintain regular backups of website content to enable quick restoration in case of defacement or compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
CERT-PL
Date Reserved
2026-01-22T14:08:35.743Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a182d732ffcdb8a2282723

Added to database: 2/27/2026, 11:41:11 AM

Last enriched: 2/27/2026, 11:58:05 AM

Last updated: 2/27/2026, 1:42:57 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses