Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32277: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in opensource-workshop connect-cms

0
High
VulnerabilityCVE-2026-32277cvecve-2026-32277cwe-79
Published: Mon Mar 23 2026 (03/23/2026, 21:22:08 UTC)
Source: CVE Database V5
Vendor/Project: opensource-workshop
Product: connect-cms

Description

CVE-2026-32277 is a high-severity DOM-based Cross-Site Scripting (XSS) vulnerability found in the Cabinet Plugin list view of Connect-CMS, an open-source content management system. It affects versions 1. 35. 0 through 1. 41. 0 and 2. 35. 0 through 2. 41. 0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 00:10:40 UTC

Technical Analysis

CVE-2026-32277 is a DOM-based Cross-Site Scripting (XSS) vulnerability classified under CWE-79, affecting the Cabinet Plugin list view in Connect-CMS versions 1.35.0 through 1.41.0 and 2.35.0 through 2.41.0. Connect-CMS is an open-source content management system widely used for website management. The vulnerability arises from improper neutralization of input during web page generation, allowing malicious scripts to be injected and executed in the context of the victim's browser. This DOM-based XSS means the malicious payload is executed as a result of client-side script processing, rather than server-side. An attacker with limited privileges (PR:L) can craft a malicious link or content that, when interacted with by a user (UI:R), triggers the execution of arbitrary JavaScript code. The vulnerability impacts confidentiality and integrity by enabling session hijacking, credential theft, or unauthorized actions within the CMS environment. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component. The CVSS 3.1 score of 8.7 reflects the high risk posed by this vulnerability. While no known exploits are currently reported in the wild, the availability of a patch in versions 1.41.1 and 2.41.1 underscores the importance of timely updates. The vulnerability is particularly relevant for organizations relying on Connect-CMS for content management, especially those using the Cabinet Plugin. The attack vector is network-based with low attack complexity, but requires user interaction and some privileges, making social engineering a likely exploitation method.

Potential Impact

The impact of CVE-2026-32277 is significant for organizations using affected versions of Connect-CMS. Successful exploitation can lead to the compromise of user sessions, theft of sensitive data, and unauthorized actions within the CMS, potentially allowing attackers to manipulate website content or gain further access. This can damage organizational reputation, lead to data breaches, and disrupt business operations reliant on the CMS. Because the vulnerability affects confidentiality and integrity without impacting availability, attackers may remain undetected while conducting persistent attacks. The requirement for user interaction and limited privileges reduces the ease of exploitation but does not eliminate risk, especially in environments with many users or public-facing CMS instances. Organizations with high-value web assets or sensitive data managed through Connect-CMS are at elevated risk. Additionally, the vulnerability could be leveraged as a foothold for further attacks within a network if combined with other vulnerabilities or misconfigurations.

Mitigation Recommendations

To mitigate CVE-2026-32277, organizations should immediately upgrade Connect-CMS to versions 1.41.1 or 2.41.1 where the vulnerability is patched. Additionally, administrators should audit the use of the Cabinet Plugin and restrict its usage if not necessary. Implement Content Security Policy (CSP) headers to reduce the impact of potential XSS by restricting script execution sources. Conduct user training to raise awareness about phishing and social engineering attacks that could trigger exploitation. Regularly review and sanitize all user inputs and outputs in custom plugins or extensions to prevent similar vulnerabilities. Employ web application firewalls (WAFs) with rules targeting DOM-based XSS patterns to provide an additional layer of defense. Monitor logs for unusual activities related to the Cabinet Plugin or unexpected script execution. Finally, maintain a robust patch management process to ensure timely application of security updates.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-11T15:05:48.400Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c1d4adf4197a8e3ba0b54f

Added to database: 3/24/2026, 12:02:53 AM

Last enriched: 3/24/2026, 12:10:40 AM

Last updated: 3/24/2026, 5:19:49 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses