CVE-2026-32734: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in baserproject basercms
CVE-2026-32734 is a high-severity DOM-based Cross-site Scripting (XSS) vulnerability in baserCMS, a website development framework. It affects versions prior to 5. 2. 3 and allows attackers to inject malicious scripts during tag creation. Exploitation requires user interaction but no authentication, enabling attackers to compromise confidentiality, integrity, and availability of affected web applications. The vulnerability has been patched in version 5. 2. 3. Organizations using baserCMS versions below 5. 2.
AI Analysis
Technical Summary
CVE-2026-32734 is a DOM-based Cross-site Scripting (XSS) vulnerability identified in baserCMS, an open-source website development framework widely used for building and managing websites. The vulnerability arises from improper neutralization of input during web page generation, specifically in the tag creation functionality prior to version 5.2.3. This flaw allows an attacker to inject malicious JavaScript code that executes in the context of the victim's browser when interacting with crafted tags. The vulnerability is classified under CWE-79, indicating improper input sanitization leading to XSS. The attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R), such as clicking a malicious link or interacting with a crafted page element. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component, potentially impacting the entire web application. The impact includes low confidentiality, integrity, and availability losses, as attackers can steal session tokens, manipulate page content, or cause denial of service through script execution. The vulnerability was publicly disclosed on March 31, 2026, and patched in baserCMS version 5.2.3. No known exploits are reported in the wild, but the ease of exploitation and the common use of baserCMS in web environments make this a significant threat. The CVSS v3.1 score of 7.1 reflects the high severity due to network exploitability and the potential for broad impact on users and systems.
Potential Impact
The exploitation of CVE-2026-32734 can lead to several adverse effects on organizations using vulnerable baserCMS versions. Attackers can execute arbitrary JavaScript in the context of users’ browsers, potentially stealing sensitive information such as session cookies, authentication tokens, or personal data, leading to confidentiality breaches. Integrity can be compromised by altering displayed content or injecting malicious payloads that mislead users or propagate malware. Availability may be impacted if the injected scripts cause application crashes or disrupt normal operations. Since baserCMS is used for website development and content management, compromised sites can damage organizational reputation and trust. The vulnerability’s network accessibility and lack of required privileges increase the risk of widespread exploitation, especially in organizations with public-facing baserCMS deployments. The absence of known exploits in the wild currently reduces immediate risk, but the vulnerability remains a critical concern until patched. Organizations failing to update may face targeted attacks, phishing campaigns, or broader web-based attacks leveraging this XSS flaw.
Mitigation Recommendations
Organizations should immediately upgrade baserCMS installations to version 5.2.3 or later, where the vulnerability is patched. Beyond patching, developers should implement strict input validation and output encoding, especially for user-supplied data involved in tag creation or dynamic page generation. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of potential XSS attacks. Regularly audit and sanitize all inputs and outputs in the web application to prevent injection flaws. Security teams should monitor web traffic for suspicious activity indicative of XSS exploitation attempts. Additionally, educating users about the risks of interacting with untrusted links or content can reduce the likelihood of successful exploitation. Implementing web application firewalls (WAFs) with rules targeting XSS patterns can provide an additional defensive layer. Finally, maintain an up-to-date inventory of baserCMS deployments to ensure timely patch management and vulnerability response.
Affected Countries
Japan, United States, Germany, France, United Kingdom, Australia, South Korea, Taiwan, Brazil, India
CVE-2026-32734: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in baserproject basercms
Description
CVE-2026-32734 is a high-severity DOM-based Cross-site Scripting (XSS) vulnerability in baserCMS, a website development framework. It affects versions prior to 5. 2. 3 and allows attackers to inject malicious scripts during tag creation. Exploitation requires user interaction but no authentication, enabling attackers to compromise confidentiality, integrity, and availability of affected web applications. The vulnerability has been patched in version 5. 2. 3. Organizations using baserCMS versions below 5. 2.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-32734 is a DOM-based Cross-site Scripting (XSS) vulnerability identified in baserCMS, an open-source website development framework widely used for building and managing websites. The vulnerability arises from improper neutralization of input during web page generation, specifically in the tag creation functionality prior to version 5.2.3. This flaw allows an attacker to inject malicious JavaScript code that executes in the context of the victim's browser when interacting with crafted tags. The vulnerability is classified under CWE-79, indicating improper input sanitization leading to XSS. The attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R), such as clicking a malicious link or interacting with a crafted page element. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component, potentially impacting the entire web application. The impact includes low confidentiality, integrity, and availability losses, as attackers can steal session tokens, manipulate page content, or cause denial of service through script execution. The vulnerability was publicly disclosed on March 31, 2026, and patched in baserCMS version 5.2.3. No known exploits are reported in the wild, but the ease of exploitation and the common use of baserCMS in web environments make this a significant threat. The CVSS v3.1 score of 7.1 reflects the high severity due to network exploitability and the potential for broad impact on users and systems.
Potential Impact
The exploitation of CVE-2026-32734 can lead to several adverse effects on organizations using vulnerable baserCMS versions. Attackers can execute arbitrary JavaScript in the context of users’ browsers, potentially stealing sensitive information such as session cookies, authentication tokens, or personal data, leading to confidentiality breaches. Integrity can be compromised by altering displayed content or injecting malicious payloads that mislead users or propagate malware. Availability may be impacted if the injected scripts cause application crashes or disrupt normal operations. Since baserCMS is used for website development and content management, compromised sites can damage organizational reputation and trust. The vulnerability’s network accessibility and lack of required privileges increase the risk of widespread exploitation, especially in organizations with public-facing baserCMS deployments. The absence of known exploits in the wild currently reduces immediate risk, but the vulnerability remains a critical concern until patched. Organizations failing to update may face targeted attacks, phishing campaigns, or broader web-based attacks leveraging this XSS flaw.
Mitigation Recommendations
Organizations should immediately upgrade baserCMS installations to version 5.2.3 or later, where the vulnerability is patched. Beyond patching, developers should implement strict input validation and output encoding, especially for user-supplied data involved in tag creation or dynamic page generation. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of potential XSS attacks. Regularly audit and sanitize all inputs and outputs in the web application to prevent injection flaws. Security teams should monitor web traffic for suspicious activity indicative of XSS exploitation attempts. Additionally, educating users about the risks of interacting with untrusted links or content can reduce the likelihood of successful exploitation. Implementing web application firewalls (WAFs) with rules targeting XSS patterns can provide an additional defensive layer. Finally, maintain an up-to-date inventory of baserCMS deployments to ensure timely patch management and vulnerability response.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-13T15:02:00.627Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69cb1e82e6bfc5ba1d9722cb
Added to database: 3/31/2026, 1:08:18 AM
Last enriched: 3/31/2026, 1:23:26 AM
Last updated: 3/31/2026, 3:16:02 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.