Impact
An authenticated stored cross‑site scripting flaw exists in the content creation and editing module of Feehi CMS version 2.1.1. By inserting malicious HTML or JavaScript into the Title field, a logged‑in user with sufficient privileges can store a payload that will execute whenever the page is viewed. This allows an attacker to hijack user sessions, deface the website, or steal credentials via client‑side attacks. The weakness is classified as CWE‑79, indicating a lack of proper input validation or output encoding.
Affected Systems
The vulnerability affects only the Feehi CMS product. The specific version impacted is 2.1.1, as identified by the CNAs and the reported CPE. No other vendors or product variants are listed. Systems running this version should verify that they are not using custom modules that extend the Title field, as the flaw is tied to that data entry point.
Risk and Exploitability
The CVSS base score of 4.8 points to medium severity and the EPSS probability is less than 1%, implying that the vulnerability is not widely exploited at present. It does not appear in the CISA KEV list, meaning no confirmed active exploitation reports. The attack requires authentication with editing rights, which is a prerequisite for exploitation. Once the payload is stored it will execute for all users who view the affected content.
OpenCVE Enrichment
Github GHSA