VYPR
Medium severity6.4NVD Advisory· Published May 16, 2026· Updated May 18, 2026

CVE-2020-37237

CVE-2020-37237

Description

Composr CMS 10.0.34 contains a persistent cross-site scripting vulnerability that allows authenticated administrators to inject malicious scripts through the banner management interface. Attackers with admin credentials can inject XSS payloads in the Description field of the Add banner functionality, which execute for all website visitors when they access the home page.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Composr CMS 10.0.34 has a persistent XSS vulnerability where authenticated admins can inject scripts via the banner Description field, affecting all visitors.

Vulnerability

Composr CMS version 10.0.34 contains a persistent cross-site scripting (XSS) vulnerability in the banner management interface [3]. The Description field of the "Add banner" functionality does not properly sanitize user input, allowing authenticated administrators to inject arbitrary HTML and JavaScript [4]. The injected payload is stored and later rendered on the home page for all visitors. The vulnerability affects Composr CMS 10.0.34 and possibly earlier versions [3].

Exploitation

An attacker must have valid administrator credentials to access the banner management interface [4]. After logging in, the attacker navigates to the "Add banner" page, enters a malicious XSS payload (e.g., `) in the Description` field, and saves the banner [4]. No additional user interaction is required beyond the initial admin action. The payload is then executed automatically whenever any user visits the home page [3].

Impact

Successful exploitation allows the attacker to execute arbitrary JavaScript in the context of any visitor's browser session when they access the home page [3]. This can lead to session hijacking, defacement, or theft of sensitive information. The attack is persistent and affects all users, not just the administrator [4].

Mitigation

The vendor has released version 10.0.52, which likely includes a fix [1]. Users should upgrade to the latest version (10.0.52 or later) available from the official download page [1]. If upgrading is not immediately possible, administrators should restrict access to the banner management interface to trusted users only. No workaround is provided in the references. The vulnerability is listed in the Exploit Database [4] but not in the CISA KEV as of the publication date.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.