Description
Zenar Content Management System contains a cross-site scripting vulnerability that allows unauthenticated attackers to inject malicious scripts by manipulating form parameters in POST requests. Attackers can inject script tags through the current_page parameter sent to the ajax.php endpoint, which reflects unsanitized user input in the response HTML to execute arbitrary JavaScript in victim browsers.
Published: 2026-05-17
Score: 5.1 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

This vulnerability arises from the Zenar Content Management System’s ajax.php endpoint, which reflects unsanitized user input from the current_page parameter in the HTML response. Because the input is not encoded, unauthenticated attackers can inject arbitrary JavaScript that will run in the victim’s browser when the page is viewed. This allows attackers to steal session cookies, deface the site, or redirect users to malicious locations. The weakness is a classic client‑side injection flaw (CWE‑79).

Affected Systems

Zenar CMS, all versions that still use ajax.php without input sanitization. The advisory does not list specific version identifiers, so any deployment of Zenar Content Management System is potentially vulnerable until a patch is applied.

Risk and Exploitability

The CVSS score of 5.1 indicates moderate severity. No EPSS score is available and the vulnerability is not in the CISA KEV catalog, suggesting it is not currently widely exploited. The attack vector is over HTTP POST to ajax.php, requiring no authentication. An attacker can simply craft a form submission with embedded script tags in the current_page field to achieve impact. However, because the payload is client‑side, the scope is limited to browsers that load the reflected content. The lack of high exploitation evidence reduces immediate risk but the potential for credential theft or session hijacking warrants attention.

Generated by OpenCVE AI on May 17, 2026 at 13:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Zenar CMS to the latest version that addresses the XSS flaw.
  • Add server‑side validation or output encoding for the current_page parameter in ajax.php to escape any script content.
  • Deploy a web‑application firewall rule that blocks or sanitizes POST requests containing script tags to the ajax.php endpoint.

Generated by OpenCVE AI on May 17, 2026 at 13:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 18 May 2026 11:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 17 May 2026 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Zenar
Zenar zenar Content Management System
Vendors & Products Zenar
Zenar zenar Content Management System

Sun, 17 May 2026 12:30:00 +0000

Type Values Removed Values Added
Description Zenar Content Management System contains a cross-site scripting vulnerability that allows unauthenticated attackers to inject malicious scripts by manipulating form parameters in POST requests. Attackers can inject script tags through the current_page parameter sent to the ajax.php endpoint, which reflects unsanitized user input in the response HTML to execute arbitrary JavaScript in victim browsers.
Title Zenar Content Management System Cross-Site Scripting via ajax.php
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Zenar Zenar Content Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-18T10:47:53.285Z

Reserved: 2026-05-17T11:47:21.491Z

Link: CVE-2018-25331

cve-icon Vulnrichment

Updated: 2026-05-18T10:46:07.648Z

cve-icon NVD

Status : Received

Published: 2026-05-17T13:16:44.710

Modified: 2026-05-17T13:16:44.710

Link: CVE-2018-25331

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-17T17:00:00Z

Weaknesses