CVE-2021-47808
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-16

Last updated on: 2026-02-02

Assigner: VulnCheck

Description
Cotonti Siena 0.9.19 contains a stored cross-site scripting vulnerability in the admin configuration panel's site title parameter. Attackers can inject malicious JavaScript code through the 'maintitle' parameter to execute scripts when administrators view the page.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-16
Last Modified
2026-02-02
Generated
2026-05-07
AI Q&A
2026-01-16
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
cotonti siena 0.9.19
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2021-47808 is a stored cross-site scripting (XSS) vulnerability in Cotonti Siena version 0.9.19. It occurs in the admin configuration panel's 'maintitle' parameter, which sets the site title. An attacker with access to the admin panel can inject malicious JavaScript code into this parameter. When an administrator views the affected page, the injected script executes, potentially compromising the admin session or allowing unauthorized actions. This vulnerability arises because the input is not properly sanitized before being stored and rendered. [1, 2]


How can this vulnerability impact me? :

This vulnerability can lead to the execution of arbitrary JavaScript code in the context of the administrator's browser session. This can result in session hijacking, unauthorized actions performed with admin privileges, defacement, or other malicious client-side effects. Since the malicious script executes when an admin views the page, it can compromise the security and integrity of the administrative interface and potentially the entire site. [1, 2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking if the 'maintitle' parameter in the admin configuration panel of Cotonti Siena 0.9.19 is vulnerable to stored XSS. One way to test is to send a POST request with a malicious payload to the endpoint `/cotonti/admin.php?m=config&n=edit&o=core&p=title&a=update` with the 'maintitle' parameter containing a script payload such as `"><img src=1 href=1 onerror=\"javascript:alert(1)\"></img>`. If the server responds with 200 OK and the script executes when the affected page is viewed, the vulnerability exists. Example command using curl: `curl -X POST -d "maintitle=\"><img src=1 href=1 onerror=javascript:alert(1)></img>" https://yourdomain.com/cotonti/admin.php?m=config&n=edit&o=core&p=title&a=update` (requires admin credentials). Monitoring HTTP traffic for suspicious POST requests to this endpoint or unexpected script execution in the admin panel can also help detect exploitation attempts. [2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting administrative access to the configuration panel to trusted users only, ensuring that only authorized personnel can update the 'maintitle' parameter. Avoid using version 0.9.19 of Cotonti Siena and upgrade to a later version where this vulnerability is fixed if available. Additionally, implement input validation and output encoding on the 'maintitle' parameter to prevent injection of malicious scripts. Monitoring and auditing admin panel activity for suspicious changes can also help mitigate risk until a patch or upgrade is applied. [1, 2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart