CVE-2026-26351

Source
https://cve.org/CVERecord?id=CVE-2026-26351
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-26351.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-26351
Aliases
  • GHSA-95f7-vm92-8gpx
Published
2026-02-24T23:16:04.830Z
Modified
2026-02-28T08:11:18.604601Z
Severity
  • 4.8 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

GetSimpleCMS Community Edition (CE) version 3.3.16 contains a stored cross-site scripting (XSS) vulnerability in the Theme to Components functionality within components.php. User-supplied input provided to the "slug" field of a component is stored without proper output encoding. While other fields are sanitized using safeslashhtml(), the slug parameter is written to XML and later rendered in the administrative interface without sanitation, resulting in persistent execution of arbitrary JavaScript. An authenticated administrator can inject malicious script content that executes whenever the affected Components page is viewed by any authenticated user, enabling session hijacking, unauthorized administrative actions, and persistent compromise of the CMS administrative interface.

References

Affected packages

Git / github.com/getsimplecms-ce/getsimplecms-ce

Affected ranges

Type
GIT
Repo
https://github.com/getsimplecms-ce/getsimplecms-ce
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Introduced
Fixed

Affected versions

v3.*
v3.3.16
v3.3.17
v3.3.18
v3.3.18.1
v3.3.21

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-26351.json"