CVE-2021-28088
Description
Cross-site scripting (XSS) in modules/content/admin/content.php in ImpressCMS profile 1.4.2 allows remote attackers to inject arbitrary web script or HTML parameters through the "Display Name" field.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Stored XSS in ImpressCMS 1.4.2 via Display Name field allows attacker to inject arbitrary HTML/script into admin content pages.
Vulnerability
CVE-2021-28088 describes a stored cross-site scripting (XSS) vulnerability in ImpressCMS profile 1.4.2. The flaw resides in the modules/content/admin/content.php file, where the "Display Name" field in user profile settings does not properly sanitize input. This allows an attacker to inject arbitrary web script or HTML, which is then stored and later executed when an administrator accesses the content management pages [1][2].
Exploitation
To exploit this vulnerability, an attacker must first create an account on the ImpressCMS instance and edit their profile, setting the "Display Name" to a malicious payload (e.g., '>). When an administrator subsequently visits "Administration Menu" > "Modules" > "Content" > "Contents" and clicks "Add a content", the injected script is executed in the context of the administrator's browser. No authentication is required beyond the attacker having a valid user account; however, the attack requires an administrator to access the content management interface [2].
Impact
Successful exploitation allows an attacker to execute arbitrary JavaScript in the administrator's browser. This can lead to session hijacking, defacement of the admin interface, or theft of sensitive information such as cookies and CSRF tokens. The stored XSS persists across sessions, making it a serious threat to the integrity of the administration panel [1][2].
Mitigation
As of the publication date, ImpressCMS 1.4.2 is affected, and no official patch or workaround has been mentioned in the advisories [1]. Administrators are advised to restrict access to the content management pages, validate and sanitize all user inputs, and monitor for any signs of exploitation. Upgrading to a newer version or applying input filtering may be necessary to mitigate the risk [2].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
impresscms/impresscmsPackagist | <= 1.4.2 | — |
Affected products
2- ImpressCMS/profiledescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-79hv-pfx6-hhpjghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2021-28088ghsaADVISORY
- anotepad.com/note/read/s3kkk6h7ghsax_refsource_MISCWEB
- hackerone.com/reports/1119296ghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.