VYPR
Moderate severityNVD Advisory· Published May 6, 2019· Updated Aug 5, 2024

CVE-2018-13983

CVE-2018-13983

Description

ImpressCMS 1.3.10 has XSS via the PATH_INFO to htdocs/install/index.php, htdocs/install/page_langselect.php, or htdocs/install/page_modcheck.php.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

ImpressCMS 1.3.10 contains reflected XSS vulnerabilities in its installer scripts via PATH_INFO, allowing arbitrary JavaScript execution.

Vulnerability

Details

ImpressCMS 1.3.10 is affected by multiple reflected cross-site scripting (XSS) vulnerabilities in its installation scripts. The issue arises because the application does not properly sanitize user-supplied input passed through the PATH_INFO parameter to several installer endpoints, including htdocs/install/index.php, htdocs/install/page_langselect.php, and htdocs/install/page_modcheck.php [2][3]. An attacker can inject arbitrary HTML and JavaScript code into the response by crafting a malicious URL.

Exploitation

Exploitation requires no authentication, as the installer scripts are publicly accessible during the setup phase. The attacker must trick a victim into clicking a specially crafted link that includes the XSS payload in the URL path. For example, a URL like http://target/install/index.php/"'--> will execute the injected script in the victim's browser [3]. The vulnerability is classified as reflected XSS, meaning the payload is not stored on the server but is immediately reflected in the HTTP response.

Impact

Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of the victim's browser session. This can lead to session hijacking, defacement, or redirection to malicious sites. The CVSS score for this vulnerability has not been officially assigned by NVD, but the advisory from Netsparker rates it as High severity [2][3].

Mitigation

The vulnerability has been addressed in later versions of ImpressCMS. Users are strongly advised to upgrade to a patched release (e.g., ImpressCMS 2.0.3 or later) to eliminate the risk [3][4]. No workaround is available for the affected version; the only reliable mitigation is to update the software.

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
impresscms/impresscmsPackagist
<= 1.3.10

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.