๐Ÿ” CVE Alert

CVE-2026-7015

LOW 2.4

MaxSite CMS Guestbook Plugin cross site scripting

CVSS Score
2.4
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability has been found in MaxSite CMS up to 109.3. This issue affects some unknown processing of the component Guestbook Plugin. Such manipulation of the argument f_text/f_slug/f_limit/f_email leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 109.4 is capable of addressing this issue. The name of the patch is 8a3946bd0a54bfb72a4d57179fcd253f2c550cd7. It is suggested to upgrade the affected component. The vendor was informed early about this issue. They classify it as a "Self-XSS". They deployed a countermeasure: "Nevertheless, we consider this a violation of secure coding standards. The lack of filtering via `htmlspecialchars()` has already been fixed in the latest patch to prevent incorrect data display."

CWE CWE-79 CWE-94
Vendor maxsite
Product cms
Published Apr 26, 2026
Stay Ahead of the Next One

Get instant alerts for maxsite cms

Be the first to know when new low vulnerabilities affecting maxsite cms are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

MaxSite / CMS
109.0 109.1 109.2 109.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/359595 vuldb.com: https://vuldb.com/vuln/359595/cti vuldb.com: https://vuldb.com/submit/796740 github.com: https://github.com/wnaspy/CVE/blob/main/Report-%20Stored%20XSS-in-guestbook-plugin-maxsite-cms.pdf.pdf github.com: https://github.com/maxsite/cms/commit/8a3946bd0a54bfb72a4d57179fcd253f2c550cd7 github.com: https://github.com/maxsite/cms/releases/tag/v109 github.com: https://github.com/maxsite/cms/

Credits

๐Ÿ” konchan (VulDB User) VulDB CNA Team