CVE-2018-13983
Description
ImpressCMS 1.3.10 has XSS via the PATH_INFO to htdocs/install/index.php, htdocs/install/page_langselect.php, or htdocs/install/page_modcheck.php.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
ImpressCMS 1.3.10 contains reflected XSS vulnerabilities in its installer scripts via PATH_INFO, allowing arbitrary JavaScript execution.
Vulnerability
Details
ImpressCMS 1.3.10 is affected by multiple reflected cross-site scripting (XSS) vulnerabilities in its installation scripts. The issue arises because the application does not properly sanitize user-supplied input passed through the PATH_INFO parameter to several installer endpoints, including htdocs/install/index.php, htdocs/install/page_langselect.php, and htdocs/install/page_modcheck.php [2][3]. An attacker can inject arbitrary HTML and JavaScript code into the response by crafting a malicious URL.
Exploitation
Exploitation requires no authentication, as the installer scripts are publicly accessible during the setup phase. The attacker must trick a victim into clicking a specially crafted link that includes the XSS payload in the URL path. For example, a URL like http://target/install/index.php/"'--> will execute the injected script in the victim's browser [3]. The vulnerability is classified as reflected XSS, meaning the payload is not stored on the server but is immediately reflected in the HTTP response.
Impact
Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of the victim's browser session. This can lead to session hijacking, defacement, or redirection to malicious sites. The CVSS score for this vulnerability has not been officially assigned by NVD, but the advisory from Netsparker rates it as High severity [2][3].
Mitigation
The vulnerability has been addressed in later versions of ImpressCMS. Users are strongly advised to upgrade to a patched release (e.g., ImpressCMS 2.0.3 or later) to eliminate the risk [3][4]. No workaround is available for the affected version; the only reliable mitigation is to update the software.
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
impresscms/impresscmsPackagist | <= 1.3.10 | — |
Affected products
2- ImpressCMS/ImpressCMSdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/advisories/GHSA-g32q-4fhf-cq72ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2018-13983ghsaADVISORY
- packetstormsecurity.com/files/150990/ImpressCMS-1.3.10-Cross-Site-Scripting.htmlghsax_refsource_MISCWEB
- seclists.org/fulldisclosure/2019/Jan/8ghsax_refsource_MISCWEB
- www.netsparker.com/web-applications-advisories/ns-18-033-cross-site-scripting-in-impresscmsghsaWEB
- www.netsparker.com/web-applications-advisories/ns-18-033-cross-site-scripting-in-impresscms/mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.