Elefant CMS Version Comparison Persistent cross site scriting
Description
A vulnerability classified as problematic was found in Elefant CMS 1.3.12-RC. Affected by this vulnerability is an unknown functionality of the component Version Comparison. The manipulation leads to basic cross site scripting (Persistent). The attack can be launched remotely. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A persistent XSS vulnerability exists in Elefant CMS 1.3.12-RC's Version Comparison component, allowing remote attackers to inject arbitrary web scripts.
Vulnerability
Analysis
CVE-2017-20058 describes a problematic persistent cross-site scripting (XSS) vulnerability found in Elefant CMS version 1.3.12-RC. The flaw resides in an unknown functionality within the Version Comparison component. Due to improper input sanitization, the component allows an attacker to inject arbitrary web scripts or HTML, which are then stored and later executed in the context of a victim's browser when the affected page is viewed [1].
Exploitation
Method
The attack vector is remote, meaning an unauthenticated user can potentially trigger the injection. The vulnerability is classified as persistent (or stored) XSS, indicating that the injected payload is saved on the server. This typically occurs via crafted input fields or parameters processed by the Version Comparison feature. Once stored, any user visiting the relevant page, including administrators, may execute the injected script without additional user interaction [1].
Impact and
Affected Versions
Successful exploitation could allow an attacker to execute arbitrary JavaScript in the victim's browser session, potentially leading to session hijacking, defacement, or data theft. The vulnerability affects Elefant CMS version 1.3.12-RC. According to the advisory, the issue is resolved in version 1.3.13, which is recommended for all users [1]. The project's repository on GitHub provides access to the source for upgrading or patching [2].
Mitigation
Status
No known public exploit code is cited in the references. The vendor has addressed the vulnerability in the subsequent release, and upgrading to Elefant CMS 1.3.13 or later eliminates the risk. No workarounds are detailed, making the upgrade the sole recommended mitigation [1][2].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
elefant/cmsPackagist | < 1.3.13 | 1.3.13 |
Affected products
2- Elefant/CMSv5Range: 1.3.12-RC
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-5hfm-g799-wjw6ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2017-20058ghsaADVISORY
- seclists.org/fulldisclosure/2017/Feb/36ghsax_refsource_MISCWEB
- vuldb.comghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.