Description
Qool CMS contains multiple persistent cross-site scripting vulnerabilities in several administrative scripts where POST parameters are not properly sanitized before being stored and returned to users. Attackers can inject malicious JavaScript code through parameters like 'title', 'name', 'email', 'username', 'link', and 'task' in endpoints such as addnewtype, addnewdatafield, addmenu, addusergroup, addnewuserfield, adduser, addgeneraldata, and addcontentitem to execute arbitrary scripts in administrator browsers.
Published: 2026-03-15
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site scripting leading to arbitrary script execution in administrator browsers
Action: Patch Immediately
AI Analysis

Impact

Qool CMS is affected by multiple persistent cross‑site scripting vulnerabilities that allow an attacker to inject malicious JavaScript through a variety of POST parameters such as title, name, email, username, link, and task. These inputs are stored and later rendered unchanged to users of the administrative interface. The primary impact is the execution of arbitrary scripts in the context of the administrator’s browser, enabling session hijacking, credential theft, or defacement. The underlying weakness is reflected input not being properly sanitized, classifying the flaw under a CWE related to XSS attacks.

Affected Systems

The vulnerabilities affect Qool CMS as provided by the manufacturer Qool. Specifically, vulnerabilities exist in administrative scripts located in endpoints including addnewtype, addnewdatafield, addmenu, addusergroup, addnewuserfield, adduser, addgeneraldata, and addcontentitem. No specific version ranges are listed in the CNA data, so all instances of the CMS that have these endpoints and have not yet been patched are potentially impacted.

Risk and Exploitability

The CVSS base score is 8.7, indicating high severity. The EPSS score is reported to be <1%, suggesting a low probability of exploitation in the near term, and the flaw is not included in the CISA KEV catalog. The likely attack vector is a web-based POST request sent to the vulnerable administrative endpoints, requiring the attacker to have a mechanism to convince an authenticated administrator to submit the crafted POST data, or to supply the payload as part of a user‑generated entry that will then be rendered by an admin. The vulnerability can be successfully exploited if the attacker can affect the POST data in these forms or if an admin inadvertently submits malicious content.

Generated by OpenCVE AI on March 21, 2026 at 14:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Qool CMS patch that addresses the stored XSS flaws
  • If a patch is not yet available, immediately implement input validation and output encoding on all POST parameters mentioned in the CVE description
  • Deploy a Content Security Policy that restricts execution of inline scripts and disallows loading of remote resources
  • Restrict administrative access to trusted IP addresses or enforce two‑factor authentication
  • Continuously monitor administrative logs for unexpected or suspicious post data and conduct regular security reviews of the CMS code

Generated by OpenCVE AI on March 21, 2026 at 14:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 16 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Qool
Qool qool Cms
Vendors & Products Qool
Qool qool Cms

Sun, 15 Mar 2026 18:45:00 +0000

Type Values Removed Values Added
Description Qool CMS contains multiple persistent cross-site scripting vulnerabilities in several administrative scripts where POST parameters are not properly sanitized before being stored and returned to users. Attackers can inject malicious JavaScript code through parameters like 'title', 'name', 'email', 'username', 'link', and 'task' in endpoints such as addnewtype, addnewdatafield, addmenu, addusergroup, addnewuserfield, adduser, addgeneraldata, and addcontentitem to execute arbitrary scripts in administrator browsers.
Title Qool CMS Multiple Persistent Cross-Site Scripting Vulnerabilities
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-16T14:20:18.616Z

Reserved: 2026-03-15T18:03:18.972Z

Link: CVE-2013-20006

cve-icon Vulnrichment

Updated: 2026-03-16T14:17:23.703Z

cve-icon NVD

Status : Deferred

Published: 2026-03-16T14:17:46.170

Modified: 2026-04-15T14:56:45.970

Link: CVE-2013-20006

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T14:01:34Z

Weaknesses