VYPR
Moderate severityNVD Advisory· Published Jun 20, 2022· Updated Apr 15, 2025

Elefant CMS Version Comparison Persistent cross site scriting

CVE-2017-20058

Description

A vulnerability classified as problematic was found in Elefant CMS 1.3.12-RC. Affected by this vulnerability is an unknown functionality of the component Version Comparison. The manipulation leads to basic cross site scripting (Persistent). The attack can be launched remotely. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A persistent XSS vulnerability exists in Elefant CMS 1.3.12-RC's Version Comparison component, allowing remote attackers to inject arbitrary web scripts.

Vulnerability

Analysis

CVE-2017-20058 describes a problematic persistent cross-site scripting (XSS) vulnerability found in Elefant CMS version 1.3.12-RC. The flaw resides in an unknown functionality within the Version Comparison component. Due to improper input sanitization, the component allows an attacker to inject arbitrary web scripts or HTML, which are then stored and later executed in the context of a victim's browser when the affected page is viewed [1].

Exploitation

Method

The attack vector is remote, meaning an unauthenticated user can potentially trigger the injection. The vulnerability is classified as persistent (or stored) XSS, indicating that the injected payload is saved on the server. This typically occurs via crafted input fields or parameters processed by the Version Comparison feature. Once stored, any user visiting the relevant page, including administrators, may execute the injected script without additional user interaction [1].

Impact and

Affected Versions

Successful exploitation could allow an attacker to execute arbitrary JavaScript in the victim's browser session, potentially leading to session hijacking, defacement, or data theft. The vulnerability affects Elefant CMS version 1.3.12-RC. According to the advisory, the issue is resolved in version 1.3.13, which is recommended for all users [1]. The project's repository on GitHub provides access to the source for upgrading or patching [2].

Mitigation

Status

No known public exploit code is cited in the references. The vendor has addressed the vulnerability in the subsequent release, and upgrading to Elefant CMS 1.3.13 or later eliminates the risk. No workarounds are detailed, making the upgrade the sole recommended mitigation [1][2].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
elefant/cmsPackagist
< 1.3.131.3.13

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.