CVE-2026-6184
Received Received - Intake
Cross-Site Scripting in Simple CMS 1.0 Admin Panel

Publication date: 2026-04-13

Last updated on: 2026-04-29

Assigner: VulDB

Description
A weakness has been identified in code-projects Simple Content Management System 1.0. This affects an unknown part of the file /web/admin/welcome.php. Executing a manipulation of the argument News Title can lead to cross site scripting. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-13
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-04-13
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
code-projects simple_content_management_system 1.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
CWE-94 The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-6184 is a Stored Cross-Site Scripting (XSS) vulnerability found in Simple Content Management System version 1.0. It exists in the News Title field within the admin panel at /web/admin/welcome.php. The system fails to properly sanitize user input before storing it in the database and later displaying it on the public index page (/web/index.php).

An authenticated attacker with admin access can inject malicious JavaScript code into the News Title field. When any visitor accesses the public index page, the injected script executes in their browser.

This can lead to session cookie theft and session hijacking, potentially allowing the attacker to take over user accounts, including administrative ones.


How can this vulnerability impact me? :

This vulnerability can have serious security impacts. An attacker with admin access can inject malicious scripts that execute in the browsers of visitors to the public index page.

  • Stealing session cookies, which can lead to session hijacking.
  • Potential account takeover, including administrative accounts.
  • Compromise of user data and unauthorized actions performed on behalf of users.

How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by verifying if the News Title field in the admin panel located at /web/admin/welcome.php is vulnerable to stored cross-site scripting (XSS). An authenticated admin user can test this by injecting a simple JavaScript payload such as <script>alert(document.cookie)</script> into the News Title field and then visiting the public index page (/web/index.php) to see if the script executes.

To detect this on your system, you can perform the following steps:

  • Log in to the admin panel with valid admin credentials.
  • Navigate to the Add News page or the section where the News Title field is present.
  • Inject a test script payload such as <script>alert(document.cookie)</script> into the News Title field.
  • Submit the form and then visit the public index page (/web/index.php).
  • Observe if the alert box appears or if the script executes, indicating the presence of the stored XSS vulnerability.

There are no specific network commands provided to detect this vulnerability remotely without authentication, as the attack requires admin access.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include:

  • Restrict or disable admin access to trusted users only to reduce the risk of malicious input.
  • Avoid entering untrusted or suspicious input into the News Title field until a patch or fix is applied.
  • Implement input validation and sanitization on the News Title field to prevent injection of malicious scripts.
  • Apply any available patches or updates from the vendor or maintainers of the Simple Content Management System.
  • Monitor logs and user activity for suspicious behavior related to the admin panel.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows an authenticated admin user to inject malicious scripts into the News Title field, which can lead to session hijacking and account takeover by stealing session cookies of visitors. This kind of security weakness can potentially lead to unauthorized access to sensitive information or user accounts.

Such unauthorized access and potential data breaches could negatively impact compliance with common standards and regulations like GDPR and HIPAA, which require protection of personal data and secure access controls. However, the provided information does not explicitly state the impact on compliance or specific regulatory consequences.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart