CVE-2026-3395

Source
https://cve.org/CVERecord?id=CVE-2026-3395
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-3395.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-3395
Published
2026-03-01T14:16:05.960Z
Modified
2026-03-03T01:23:47.204759Z
Severity
  • 7.3 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L CVSS Calculator
Summary
[none]
Details

A flaw has been found in MaxSite CMS up to 109.1. This impacts the function eval of the file application/maxsite/admin/plugins/editor_markitup/preview-ajax.php of the component MarkItUp Preview AJAX Endpoint. Executing a manipulation can lead to code injection. It is possible to launch the attack remotely. The exploit has been published and may be used. Upgrading to version 109.2 will fix this issue. This patch is called 08937a3c5d672a242d68f53e9fccf8a748820ef3. You should upgrade the affected component. The code maintainer was informed beforehand about the issues. He reacted very fast and highly professional.

References

Affected packages

Git / github.com/maxsite/cms

Affected ranges

Type
GIT
Repo
https://github.com/maxsite/cms
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*
v0.87
v0.87.1
v0.88
v0.89
v0.90
v0.91
v0.92
v0.93
v0.94
v0.95
v0.96
Other
v100
v101
v102
v104
v106
v107
v108
v109
v97
v98
v99

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-3395.json"