Description
PluXml CMS is vulnerable to Stored XSS in file uploading functionality. An authenticated attacker can upload an SVG file containing a malicious payload, which will be executed when a victim clicks the link associated with the uploaded image.
In version 5.9.0-rc7 clicking the link associated with the uploaded image doesn't execute malicious code but directly accessing the file will still execute the embedded payload.

The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only versions 5.8.21 and 5.9.0-rc7 were tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
Published: 2026-02-27
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Patch or Mitigate
AI Analysis

Impact

The vulnerability is a Stored XSS in the PluXml CMS file‑uploading component. An attacker with CMS credentials can upload a specially crafted SVG file that contains malicious JavaScript. When a user visits or clicks the link to that image, the browser executes the injected code, potentially allowing the attacker to hijack the victim’s session, steal cookies, or perform actions on the site under that user’s authority.

Affected Systems

The attack is limited to PluXml CMS. Versions 5.8.21 and 5.9.0‑rc7 have been confirmed vulnerable. Other releases have not been tested but might contain the same flaw, so administrators should treat all unreleased or earlier versions with caution.

Risk and Exploitability

The CVSS base score is 5.1, indicating moderate severity. The EPSS score is less than 1 %, implying a very low public exploitation probability. The vulnerability is not listed in CISA’s KEV catalog. Exploitation requires authenticated access to the CMS to upload the SVG file and a subsequent user interaction with the link. Thus the threat is confined to privileged uploaders or attackers who have obtained legitimate CMS credentials. As no public exploit has been reported, the immediate risk is low, but the potential impact remains high if an attacker compromises a user account.

Generated by OpenCVE AI on April 17, 2026 at 14:00 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Disallow or restrict the upload of SVG files; enforce allowed file types or sanitize SVG uploads before storage.
  • Apply the vendor’s latest patch or upgrade to a newer version of PluXml CMS once a fix is released; if no patch exists, request an upstream fix.
  • Limit upload permissions to trusted users only, revoking or removing the ability for ordinary accounts to upload files.
  • Audit existing uploads for embedded scripts, sanitize or delete SVG files that contain executable payloads.

Generated by OpenCVE AI on April 17, 2026 at 14:00 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Feb 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Pluxml
Pluxml pluxml
CPEs cpe:2.3:a:pluxml:pluxml:5.8.21:*:*:*:*:*:*:*
cpe:2.3:a:pluxml:pluxml:5.8.9:rc7:*:*:*:*:*:*
Vendors & Products Pluxml
Pluxml pluxml
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}


Fri, 27 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Feb 2026 11:45:00 +0000

Type Values Removed Values Added
Description PluXml CMS is vulnerable to Stored XSS in file uploading functionality. An authenticated attacker can upload an SVG file containing a malicious payload, which will be executed when a victim clicks the link associated with the uploaded image. In version 5.9.0-rc7 clicking the link associated with the uploaded image doesn't execute malicious code but directly accessing the file will still execute the embedded payload. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only versions 5.8.21 and 5.9.0-rc7 were tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
Title Stored XSS in PluXml CMS
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-PL

Published:

Updated: 2026-02-27T15:16:22.413Z

Reserved: 2026-01-22T14:08:35.742Z

Link: CVE-2026-24350

cve-icon Vulnrichment

Updated: 2026-02-27T15:16:17.737Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-27T12:16:02.867

Modified: 2026-02-27T18:33:58.880

Link: CVE-2026-24350

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T14:15:21Z

Weaknesses