CVE-2022-24563
Description
In Genixcms v1.1.11, a stored Cross-Site Scripting (XSS) vulnerability exists in /gxadmin/index.php?page=themes&view=options" via the intro_title and intro_image parameters.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Stored XSS in Genixcms v1.1.11 via intro_title and intro_image parameters allows arbitrary script injection in the admin panel.
Vulnerability
In Genixcms v1.1.11, a stored Cross-Site Scripting (XSS) vulnerability exists in /gxadmin/index.php?page=themes&view=options via the intro_title and intro_image parameters [1]. The application fails to properly sanitize user-supplied input, allowing an authenticated attacker to inject arbitrary HTML or JavaScript code that is stored and later executed in the context of the admin interface [1].
Exploitation
An attacker must have at least low-privileged (e.g., editor-level) access to the GeniXCMS admin panel, as the vulnerable endpoint is restricted to admin users [1]. The attacker navigates to the themes options page and submits a crafted payload (e.g., `) in either the intro_title or intro_image` fields [1]. No additional user interaction is required after submission; the payload is stored in the database and rendered unsafely on subsequent page loads [1].
Impact
Successful exploitation allows the attacker to execute arbitrary JavaScript in the browser of any admin who views the affected theme options page [1]. This can lead to session hijacking, admin credential theft, defacement, or forced actions performed on behalf of the victim admin within the same session [1]. The impact is limited to the admin panel context, but a compromise of admin privileges can cascade to full site control.
Mitigation
The official fix was released in GeniXCMS v2.4.0, which addresses the XSS vulnerability through input sanitization [2]. Users of v1.1.11 should upgrade to the latest stable version immediately [2]. No workaround is publicly documented for unpatched installations [1][2].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
genix/cmsPackagist | <= 1.1.11 | — |
Affected products
2- Genixcms/Genixcmsdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-5mwx-f6w6-7w5rghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2022-24563ghsaADVISORY
- genix.meghsaWEB
- genix.memitrex_refsource_MISC
- github.com/truonghuuphuc/CVE/blob/main/CVE-2022-24563.pdfghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.