CVE-2026-2200
Cross-Site Scripting in heyewei JFinalCMS 5.0.0 API Endpoint
Publication date: 2026-02-09
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| heyewei | jfinalcms | 5.0.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
| CWE-94 | The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': 'CVE-2026-2200 is a cross-site scripting (XSS) vulnerability found in heyewei JFinalCMS version 5.0.0, specifically affecting the API endpoint /admin/admin/save.'}, {'type': 'paragraph', 'content': 'The vulnerability arises because the endpoint improperly neutralizes user input before storing certain parameters in the backend database. This insufficient input filtering allows malicious scripts to be stored persistently.'}, {'type': 'paragraph', 'content': "When this stored data is later rendered on web pages without proper escaping, it leads to stored XSS, enabling attackers to inject persistent JavaScript payloads that execute in the victim's browser context."}, {'type': 'paragraph', 'content': 'Exploitation requires the attacker to be authenticated and some user interaction to trigger the attack.'}] [2, 3]
How can this vulnerability impact me? :
[{'type': 'paragraph', 'content': "This vulnerability can impact you by allowing remote attackers to inject malicious scripts that execute in the context of other users' browsers."}, {'type': 'paragraph', 'content': 'Such attacks can lead to stealing session cookies, performing unauthorized operations on behalf of victims, and compromising the integrity of the system.'}, {'type': 'paragraph', 'content': 'Because the exploit is publicly available and remotely executable, attackers can leverage it to conduct persistent cross-site scripting attacks, potentially affecting authenticated users.'}] [2, 3]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability affects the API endpoint /admin/admin/save in heyewei JFinalCMS 5.0.0 and involves stored cross-site scripting due to improper input neutralization. Detection can involve monitoring HTTP requests to this endpoint for suspicious input containing script tags or JavaScript payloads.'}, {'type': 'paragraph', 'content': 'Since the exploit requires authentication and user interaction, detection can include reviewing web server logs for unusual POST requests to /admin/admin/save with payloads containing script or HTML tags.'}, {'type': 'list_item', 'content': 'Use tools like curl or wget to send crafted requests to the endpoint and observe responses.'}, {'type': 'list_item', 'content': 'Example curl command to test for XSS injection:'}, {'type': 'list_item', 'content': "curl -X POST -d 'param=<script>alert(1)</script>' https://yourserver/admin/admin/save -b 'auth_cookie=your_auth_cookie'"}, {'type': 'list_item', 'content': 'Check the web application output or database for stored script tags indicating successful injection.'}, {'type': 'list_item', 'content': 'Use web vulnerability scanners that support authenticated scans targeting stored XSS vulnerabilities on the affected endpoint.'}] [2, 3]
What immediate steps should I take to mitigate this vulnerability?
Currently, there are no known countermeasures or patches specifically recommended for this vulnerability.
Immediate mitigation steps include restricting access to the /admin/admin/save endpoint to trusted and authenticated users only, as exploitation requires authentication.
Implement input validation and output encoding on the server side to neutralize any malicious scripts before storing or rendering user input.
Consider replacing the affected product with an alternative solution as a precaution.
Monitor for suspicious activity and apply web application firewall (WAF) rules to detect and block attempts to inject scripts.