This vulnerability was successfully registered in CVE database.
https://www.cvedetails.com/cve/CVE-2021-43154/
Vulnerability is present on the following version: 2.2.15 (CMS made simple) cmsms-2.2.15-install.zip
All checks enabled at install phase.
The following image will show a “dashboard” of a user with privileges: Any user who can “Add category” or “Edit category” from “Site Admin” -> “Settings - News module” can trigger a stored cross site scripting vulnerability. An attacker can update the name field to a xss payload such as:
<script>alert("trigger")</script>
Submit Request (payload in m1_name): Submit Response: After following redirection:
View content -> news Reflection of payload:
View site (all pages) or preview site All pages/articles can trigger this vulnerability
Reflection of payload in response:
We recommend to sanitize all user input from all parameters, especially “m1_name” from admin/moduleinterface.php