Stored Cross-Site Scripting via m1_name (Authenticated)
CVE-2021-43154
This vulnerability was successfully registered in CVE database.
https://www.cvedetails.com/cve/CVE-2021-43154/
Product Version
Vulnerability is present on the following version: 2.2.15 (CMS made simple)
cmsms-2.2.15-install.zip
All checks enabled at install phase.
Proof of Concept
The following image will show a “dashboard” of a user with privileges:
Any user who can “Add category” or “Edit category” from “Site Admin” -> “Settings - News module” can trigger a stored cross site scripting vulnerability.
An attacker can update the name field to a xss payload such as:
<script>alert("trigger")</script>
Submit Request (payload in m1_name):
Submit Response:
After following redirection:

Trigger:
-
View content -> news
Reflection of payload:

-
View site (all pages) or preview site
All pages/articles can trigger this vulnerability
Reflection of payload in response:

We recommend to sanitize all user input from all parameters, especially “m1_name” from admin/moduleinterface.php