Description
Nukegraphic CMS v3.1.2 contains a stored cross-site scripting (XSS) vulnerability in the user profile edit functionality at /ngc-cms/user-edit-profile.php. The application fails to properly sanitize user input in the name field before storing it in the database and rendering it across multiple CMS pages. An authenticated attacker with low privileges can inject malicious JavaScript payloads through the profile edit request, which are then executed site-wide whenever the affected user's name is displayed. This allows the attacker to execute arbitrary JavaScript in the context of other users' sessions, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of victims.
Published: 2026-02-05
Score: 8.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Stored XSS allowing arbitrary JavaScript execution and session hijacking
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a stored cross‑site scripting flaw in the profile edit feature that fails to sanitize the name field. An attacker who logs in with a low‑privilege account can inject malicious JavaScript, which is then rendered on every page that displays the user’s name. This allows the attacker to run arbitrary scripts in victims’ browsers, enabling session hijacking, credential theft, and the execution of unauthorized actions in the victims’ sessions.

Affected Systems

Nukegraphic CMS version 3.1.2 is affected. No other versions or products are currently listed as impacted.

Risk and Exploitability

The CVSS score of 8.2 classifies the flaw as high severity. The EPSS score of less than 1% indicates a low probability of exploitation at present, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is likely local to an authenticated attacker with low privileges, who can reach other users simply by reading pages that display the compromised name. The risk remains significant because the vulnerability enables arbitrary code execution within the victims’ browser context.

Generated by OpenCVE AI on April 17, 2026 at 23:02 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest Nukegraphic CMS release that addresses input sanitization in the name field.
  • Apply server‑side input validation and output encoding for the name field, for example using PHP’s htmlspecialchars or a dedicated library such as OWASP ESAPI.
  • Use a Web Application Firewall or a Content Security Policy rule to block the injection of script tags in user profile names and to detect suspicious activity.

Generated by OpenCVE AI on April 17, 2026 at 23:02 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 06 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Nukegraphic
Nukegraphic nukegraphic Cms
Vendors & Products Nukegraphic
Nukegraphic nukegraphic Cms

Thu, 05 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 05 Feb 2026 07:00:00 +0000

Type Values Removed Values Added
Description Nukegraphic CMS v3.1.2 contains a stored cross-site scripting (XSS) vulnerability in the user profile edit functionality at /ngc-cms/user-edit-profile.php. The application fails to properly sanitize user input in the name field before storing it in the database and rendering it across multiple CMS pages. An authenticated attacker with low privileges can inject malicious JavaScript payloads through the profile edit request, which are then executed site-wide whenever the affected user's name is displayed. This allows the attacker to execute arbitrary JavaScript in the context of other users' sessions, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of victims.
Title Stored Cross Site Scripting(XSS) in Nukegraphic CMS V3.1.2
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 8.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N'}


Subscriptions

Nukegraphic Nukegraphic Cms
cve-icon MITRE

Status: PUBLISHED

Assigner: Gridware

Published:

Updated: 2026-02-05T14:36:07.433Z

Reserved: 2026-02-05T06:06:37.006Z

Link: CVE-2026-1953

cve-icon Vulnrichment

Updated: 2026-02-05T14:35:49.130Z

cve-icon NVD

Status : Deferred

Published: 2026-02-05T07:16:17.910

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-1953

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T23:15:30Z

Weaknesses