NukeViet CMS <= 4.5.08 contains a Stored Cross-Site Scripting (XSS) vulnerability caused by insufficient server-side input sanitization in the Request class. The application relies primarily on client-side filtering to sanitize HTML tags and attributes in user-submitted content, which can be bypassed by intercepting and modifying HTTP requests directly (e.g., using Burp Suite).
This affects any module or functionality that accepts user HTML input through the Request class. An attacker can inject malicious payloads such as <iframe srcdoc="<img src=1 onerror=alert(document.cookie)>"></iframe>, which are stored server-side and executed in the browser of any user who views the content.
Who is impacted: - Administrators and moderators who view user-submitted content (e.g., contact messages, comments, or any module using the Request class for HTML input). - The Contact module was used as a proof of concept, but the vulnerability is not limited to this module. - No authentication is required to exploit this vulnerability, making it accessible to any anonymous visitor.
Potential impact includes: - Session hijacking via cookie theft (for non-HttpOnly cookies) - Performing actions on the application under the victim's identity - Defacement or redirection to phishing pages - Phishing attacks via manipulated email notifications
This vulnerability has been fixed in NukeViet 4.5.08. Users should upgrade to version >= 4.5.08.
<iframe>, srcdoc, event handlers such as onerror, onload).HttpOnly flag to mitigate cookie theft via XSS.{
"severity": "HIGH",
"cwe_ids": [
"CWE-79"
],
"github_reviewed": true,
"github_reviewed_at": "2026-05-15T16:45:03Z",
"nvd_published_at": null
}