CVE-2026-29933
Reflected XSS in YZMCMS v7.4 /index/login.html Allows Script Execution
Publication date: 2026-03-26
Last updated on: 2026-03-31
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| yzmcms | yzmcms | 7.4 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-29933 is a reflected Cross-Site Scripting (XSS) vulnerability found in the /index/login.html component of YZMCMS version 7.4. This vulnerability allows attackers to execute arbitrary JavaScript code in the context of a user's browser by modifying the "referer" value in the HTTP request header.
An attacker can intercept a data packet during processes like account registration, alter the "referer" parameter to include malicious JavaScript code (for example, `javascript:alert(1)//`), and then release the modified packet. When the user interacts with the affected page, the injected script executes, demonstrating the XSS flaw.
How can this vulnerability impact me? :
This vulnerability can allow attackers to execute arbitrary JavaScript in your browser without requiring authentication. This can lead to several impacts including theft of sensitive information such as cookies or session tokens, unauthorized actions performed on behalf of the user, and potential redirection to malicious sites.
Such attacks can compromise user accounts, lead to data breaches, and damage the trustworthiness of the affected application.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by intercepting HTTP requests to the /index/login.html component of YZMCMS v7.4 and inspecting the "referer" header for malicious payloads such as JavaScript code.
A practical approach is to capture and modify the "referer" header in requests during the account registration or login process to test if the application executes injected scripts.
For detection, you can use tools like curl or intercepting proxies (e.g., Burp Suite) to send requests with a modified referer header containing a test payload such as `javascript:alert(1)//`.
- Example curl command to test the vulnerability: curl -H "Referer: javascript:alert(1)//" https://targetsite.com/index/login.html
- Use an intercepting proxy to capture the HTTP request and modify the Referer header to include a JavaScript payload, then observe if the script executes in the user's browser.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include implementing strict input validation and output encoding to prevent execution of malicious scripts injected via the Referer header.
- Validate all input data for length, type, syntax, and business rules before processing or displaying it.
- Properly encode user-submitted data before output, converting all characters to their corresponding HTML entities (e.g., `"` to `"`, `<` to `<`, `>` to `>`).
- Specify the encoding method (such as UTF-8) clearly for output to prevent encoding ambiguity.
- Avoid relying on blacklist filtering alone, as it can be bypassed by XSS variants.
- Normalize and decode inputs before validation to avoid normalization errors and ensure inputs are not decoded multiple times.
- Filter or convert special characters submitted by clients to their entity forms to prevent script injection.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The CVE-2026-29933 reflected XSS vulnerability in YZMCMS v7.4 allows attackers to execute arbitrary JavaScript in users' browsers by manipulating the referrer header. Such vulnerabilities can lead to unauthorized access to user data or session hijacking, which may compromise the confidentiality and integrity of personal information.
This kind of security flaw can negatively impact compliance with common standards and regulations like GDPR and HIPAA, which require protection of personal data against unauthorized access and breaches. Failure to mitigate reflected XSS vulnerabilities could result in violations of these regulations due to potential data exposure or misuse.
Therefore, addressing this vulnerability through recommended remediation measures (such as input validation, output encoding, and proper filtering) is essential to maintain compliance with data protection standards.