Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 14 Jan 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 14 Jan 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
E107
E107 e107 E107 e107 Cms |
|
| Vendors & Products |
E107
E107 e107 E107 e107 Cms |
Tue, 13 Jan 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | e107 CMS version 3.2.1 contains multiple vulnerabilities that allow cross-site scripting (XSS) attacks. The first vulnerability is a reflected XSS that occurs in the news comment functionality when authenticated users interact with the comment form. An attacker can inject malicious JavaScript code through the URL parameter that gets executed when users click outside the comment field after typing content. The second vulnerability involves an upload restriction bypass for authenticated administrators, allowing them to upload SVG files containing malicious code through the media manager's remote URL upload feature. This results in stored XSS when the uploaded SVG files are accessed. These vulnerabilities were discovered by Hubert Wojciechowski and affect the news.php and image.php components of the CMS. | |
| Title | e107 CMS v3.2.1 - Reflected XSS via Comment Flow | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-01-14T19:20:19.366Z
Reserved: 2026-01-11T13:14:18.876Z
Link: CVE-2022-50905
Updated: 2026-01-14T15:51:36.126Z
Status : Undergoing Analysis
Published: 2026-01-13T23:15:53.083
Modified: 2026-01-14T20:15:56.550
Link: CVE-2022-50905
No data.
OpenCVE Enrichment
Updated: 2026-01-14T11:08:20Z