Description
A weakness has been identified in heyewei JFinalCMS 5.0.0. This affects an unknown function of the file /admin/admin/save of the component API Endpoint. Executing a manipulation can lead to cross site scripting. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.
Published: 2026-02-09
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting (XSS)
Action: Patch Now
AI Analysis

Impact

A vulnerability has been discovered in the 5.0.0 release of heyewei JFinalCMS. When an attacker submits a crafted payload to the /admin/admin/save API endpoint, the system stores the input without proper sanitization, allowing arbitrary JavaScript to be embedded. When that stored content is later rendered in the web application, the injected script runs in the victim’s browser, enabling session hijacking, data theft, or site defacement. The flaw is a stored cross‑site scripting (XSS) condition covered by CWE‑79 and CWE‑94.

Affected Systems

Systems running the heyewei JFinalCMS 5.0.0 component are affected. The vulnerability is linked to the /admin/admin/save endpoint of the CMS administration area. No other product versions are listed as impacted in the available data.

Risk and Exploitability

The base CVSS score of 4.8 indicates a moderate risk rating. The EPSS score is reported as less than 1 percent, implying that exploitation is unlikely at this time, and the vulnerability is not included in the CISA KEV catalog. Attackers can initiate the exploit remotely by sending a malicious request to the admin interface; however, the ability to trigger the stored script depends on successful data persistence and subsequent page rendering. Because the flaw resides in an administrative endpoint, it is likely that an attacker would need access to an active admin session to inject the payload, but this is inferred from the description.

Generated by OpenCVE AI on April 18, 2026 at 13:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to a patched release of JFinalCMS that addresses the XSS flaw, if such a version exists.
  • Implement server‑side input validation and output encoding for the /admin/admin/save endpoint to strip or neutralize script tags before storing data.
  • Enable a strong Content Security Policy that restricts inline script execution and disallows external script loading from untrusted sources.

Generated by OpenCVE AI on April 18, 2026 at 13:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 10:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:heyewei:jfinalcms:*:*:*:*:*:*:*:*

Tue, 17 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:heyewei:jfinalcms:5.0.0:*:*:*:*:*:*:*

Mon, 09 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Heyewei
Heyewei jfinalcms
Vendors & Products Heyewei
Heyewei jfinalcms

Mon, 09 Feb 2026 01:45:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in heyewei JFinalCMS 5.0.0. This affects an unknown function of the file /admin/admin/save of the component API Endpoint. Executing a manipulation can lead to cross site scripting. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.
Title heyewei JFinalCMS API Endpoint save cross site scripting
Weaknesses CWE-79
CWE-94
References
Metrics cvssV2_0

{'score': 3.3, 'vector': 'AV:N/AC:L/Au:M/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 2.4, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 2.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Heyewei Jfinalcms
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:52:53.144Z

Reserved: 2026-02-07T17:40:53.635Z

Link: CVE-2026-2200

cve-icon Vulnrichment

Updated: 2026-02-09T16:35:06.794Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-09T02:16:03.557

Modified: 2026-02-17T19:01:38.293

Link: CVE-2026-2200

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T13:15:25Z

Weaknesses