VYPR
Moderate severityNVD Advisory· Published Mar 4, 2022· Updated Aug 4, 2024

CVE-2020-18324

CVE-2020-18324

Description

Cross Site Scripting (XSS) vulnerability exists in Subrion CMS 4.2.1 via the q parameter in the Kickstart template.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A reflected XSS in Subrion CMS 4.2.1 via the `q` parameter in the Kickstart template allows remote attackers to inject arbitrary JavaScript.

Vulnerability

A reflected Cross-Site Scripting (XSS) vulnerability exists in Subrion CMS version 4.2.1, specifically in the Kickstart template. The search functionality passes user input from the q parameter directly into the page output without proper sanitization or encoding, making the endpoint https://localhost/search/?q=... vulnerable to arbitrary script injection [1][3].

Exploitation

A remote attacker can exploit this vulnerability by crafting a malicious URL containing JavaScript payloads in the q parameter. No authentication or special privileges are required; the attacker only needs to trick a victim into visiting the crafted link. For example, a URL such as https://localhost/search/?q= will execute the injected script in the victim's browser within the context of the vulnerable site [3].

Impact

Successful exploitation allows the attacker to execute arbitrary JavaScript in the context of the victim's browser session. This can lead to session hijacking, cookie theft, phishing page injection, or other actions that the affected web application's permissions permit. The impact is limited to the browser session of the targeted user and does not directly compromise the server [1][3].

Mitigation

No official patch has been released by the vendor for CVE-2020-18324 as of the available references. Administrators should follow OWASP Cross-Site Scripting Prevention guidelines to sanitize user input and encode output. Upgrading to a newer version of Subrion CMS (if available) is recommended. This CVE is not listed in the CISA Known Exploited Vulnerabilities (KEV) catalog [3].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
intelliants/subrionPackagist
<= 4.2.1

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.