CVE-2021-41502
Description
An issue was discovered in Subrion CMS v4.2.1 There is a stored cross-site scripting (XSS) vulnerability that can execute malicious JavaScript code by modifying the name of the uploaded image, closing the html tag, or adding the onerror attribute.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Subrion CMS v4.2.1 has a stored XSS vulnerability via crafted image filenames, allowing arbitrary JavaScript execution.
Vulnerability
Overview
CVE-2021-41502 is a stored cross-site scripting (XSS) vulnerability in Subrion CMS version 4.2.1. The flaw resides in the image upload functionality during blog editing. By manipulating the filename of an uploaded image—specifically by closing an HTML tag or adding an onerror attribute—an attacker can inject malicious JavaScript code that is stored on the server and executed when the page is viewed [1][3].
Exploitation
Details
To exploit this vulnerability, an attacker must have the ability to edit a blog entry that contains an uploaded image. The attack is performed by intercepting the save request (e.g., via Burp Suite) and modifying the image[file] parameter to include a payload such as "onerror="alert(/xss/) [3]. No authentication bypass is required; the attacker simply needs a valid account with blog editing privileges. The injected payload is stored in the database and rendered unsanitized when any user (including administrators) visits the affected blog page [1].
Impact
Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of the victim's browser. This can lead to session hijacking, defacement, theft of sensitive data, or further attacks against the CMS instance. Since the XSS is stored, every visitor to the compromised blog page is affected, amplifying the potential damage [1][3].
Mitigation
As of the publication date, Subrion CMS v4.2.1 is the affected version. Users should upgrade to a patched release if available. The official GitHub repository [2] may contain fixes in later commits. No workaround is documented; sanitizing image filenames on the server side would mitigate the issue. The vulnerability is not listed in CISA's Known Exploited Vulnerabilities catalog at the time of writing.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
intelliants/subrionPackagist | <= 4.2.1 | — |
Affected products
2- Subrion CMS/Subrion CMSdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-jvq4-cgfw-jgf4ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2021-41502ghsaADVISORY
- github.com/intelliants/subrion/issues/885ghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.