Description
CouchCMS 2.2.1 contains a cross-site scripting vulnerability that allows authenticated attackers to execute arbitrary JavaScript by uploading malicious SVG files through the file upload functionality. Attackers can upload SVG files containing embedded script tags to the browse.php endpoint, which are then executed in users' browsers when the files are accessed or previewed.
Published: 2026-05-16
Score: 5.1 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

CouchCMS 2.2.1 contains a cross‑site scripting flaw that permits an authenticated attacker to upload SVG files with embedded <script> tags through the file upload interface. When those files are accessed or previewed via the browse.php endpoint, the browser executes the malicious JavaScript. The flaw allows an attacker to run arbitrary client‑side code in the context of any user who opens the uploaded file.

Affected Systems

The vulnerability affects CouchCMS releases from version 1.3.5 through at least 2.3, including 2.2.1. The affected vendor and product is CouchCMS, CouchCMS. The CPE list enumerates all versions in that range, so any installation that has not been updated past 2.3 may be susceptible.

Risk and Exploitability

The CVSS score of 5.1 indicates moderate severity. The EPSS score is unavailable and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires valid credentials to create an upload, after which the attacker can place a malicious SVG that will execute when viewed. Because the flaw is only exploitable by authenticated users and, based on the provided exploit-db reference, it is inferred that a publicly documented exploit exists (though the extent of real-world usage is not specified), the overall risk remains moderate, but organizations should prioritize remediation to avoid a potential XSS attack vector.

Generated by OpenCVE AI on May 16, 2026 at 17:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to CouchCMS 2.3 or newer, which includes a fix that sanitizes SVG uploads.
  • Limit file‑upload privileges to administrative accounts only and validate the MIME type of uploaded files to accept only safe formats.
  • Deploy a content security policy that blocks inline scripts and forces the browser to load scripts from trusted sources.

Generated by OpenCVE AI on May 16, 2026 at 17:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 16 May 2026 15:45:00 +0000

Type Values Removed Values Added
Description CouchCMS 2.2.1 contains a cross-site scripting vulnerability that allows authenticated attackers to execute arbitrary JavaScript by uploading malicious SVG files through the file upload functionality. Attackers can upload SVG files containing embedded script tags to the browse.php endpoint, which are then executed in users' browsers when the files are accessed or previewed.
Title CouchCMS 2.2.1 Cross-Site Scripting via SVG File Upload
First Time appeared Couchcms
Couchcms couchcms
Weaknesses CWE-79
CPEs cpe:2.3:a:couchcms:couchcms:1.3.5:*:*:*:*:*:*:*
cpe:2.3:a:couchcms:couchcms:1.4.5:*:*:*:*:*:*:*
cpe:2.3:a:couchcms:couchcms:1.4.7:*:*:*:*:*:*:*
cpe:2.3:a:couchcms:couchcms:1.4:*:*:*:*:*:*:*
cpe:2.3:a:couchcms:couchcms:2.0:*:*:*:*:*:*:*
cpe:2.3:a:couchcms:couchcms:2.1:*:*:*:*:*:*:*
cpe:2.3:a:couchcms:couchcms:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:couchcms:couchcms:2.2:*:*:*:*:*:*:*
cpe:2.3:a:couchcms:couchcms:2.3:*:*:*:*:*:*:*
Vendors & Products Couchcms
Couchcms couchcms
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Couchcms Couchcms
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-16T15:26:07.851Z

Reserved: 2026-02-01T11:24:18.720Z

Link: CVE-2021-47955

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-16T16:16:21.780

Modified: 2026-05-16T16:16:21.780

Link: CVE-2021-47955

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-16T17:30:27Z

Weaknesses