Description
A weakness has been identified in PbootCMS up to 3.2.12. This impacts the function alert_location of the file apps/home/controller/MemberController.php of the component Parameter Handler. This manipulation of the argument backurl causes cross site scripting. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks.
Published: 2026-03-21
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Cross‑Site Scripting via manipulated backurl
Action: Immediate Patch
AI Analysis

Impact

The flaw lies in the alert_location function of MemberController.php in PbootCMS. An attacker can craft a URL that alters the backurl argument, inserting malicious script content. When a victim’s browser follows that URL, the injected script runs in the victim’s context, potentially stealing session tokens, defacing pages, or redirecting to malicious sites. The CVE description states that an exploit is publicly available, making the threat real and actionable.

Affected Systems

All installations of PbootCMS up through version 3.2.12 are affected. The vulnerability resides in the Parameter Handler component located at apps/home/controller/MemberController.php. Users running any unsupported or older PbootCMS build should verify their version and apply updates if available.

Risk and Exploitability

The CVSS score of 5.3 reflects medium severity. No EPSS score is provided, and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. The attack vector is remote: an attacker can deliver the exploit via a crafted URL. Because the exploit code is publicly available, the risk of widespread exploitation is present. Prompt patching or mitigations are recommended to reduce the attack surface.

Generated by OpenCVE AI on March 21, 2026 at 08:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest version of PbootCMS that removes the XSS flaw.
  • If an upgrade is not immediately possible, ensure that any value passed through the backurl parameter is properly validated or encoded before rendering it in the browser.
  • Monitor web logs for unexpected redirects or script injection attempts and apply web application firewalls or input validation rules as a temporary safeguard.

Generated by OpenCVE AI on March 21, 2026 at 08:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 21 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in PbootCMS up to 3.2.12. This impacts the function alert_location of the file apps/home/controller/MemberController.php of the component Parameter Handler. This manipulation of the argument backurl causes cross site scripting. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks.
Title PbootCMS Parameter MemberController.php alert_location cross site scripting
First Time appeared Pbootcms
Pbootcms pbootcms
Weaknesses CWE-79
CWE-94
CPEs cpe:2.3:a:pbootcms:pbootcms:*:*:*:*:*:*:*:*
Vendors & Products Pbootcms
Pbootcms pbootcms
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Pbootcms Pbootcms
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-23T15:42:19.796Z

Reserved: 2026-03-20T14:25:54.971Z

Link: CVE-2026-4510

cve-icon Vulnrichment

Updated: 2026-03-23T15:42:16.439Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-21T07:16:10.627

Modified: 2026-03-23T14:31:37.267

Link: CVE-2026-4510

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:41:17Z

Weaknesses