CVE-2022-34140
Description
A stored cross-site scripting (XSS) vulnerability in /index.php?r=site%2Fsignup of Feehi CMS v2.1.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the username field.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A stored XSS vulnerability in Feehi CMS v2.1.1 allows attackers to execute arbitrary web scripts via the username field during user registration.
Vulnerability
Description
A stored cross-site scripting (XSS) vulnerability exists in Feehi CMS v2.1.1, specifically in the /index.php?r=site%2Fsignup endpoint. The application fails to properly sanitize the username input during user registration, allowing attackers to inject arbitrary web scripts or HTML. This injection is stored on the server and executed when the malicious username is rendered in other parts of the application, such as article pages [1].
Exploitation
To exploit the vulnerability, an attacker navigates to the signup page and enters a crafted payload in the username field, such as ">. After completing the registration, the payload is stored. Subsequently, when any user (including administrators) views an article or other content that displays the username, the injected script executes in the context of the victim's browser [3]. No authentication is required for the initial injection, but the attacker must complete the registration process.
Impact
Successful exploitation allows an attacker to execute arbitrary JavaScript in the victim's browser. This can be leveraged to steal session cookies, perform actions on behalf of the victim (e.g., posting comments or modifying content), or launch phishing attacks. The stored nature of the XSS amplifies its reach, as every user visiting the affected page becomes a potential target [3].
Mitigation
As of the publication date, no official patch has been released for this vulnerability. The vendor may have addressed it in later versions, but users of Feehi CMS v2.1.1 are advised to apply input validation and output encoding to prevent XSS, or to upgrade to a newer version if available [1][3].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
feehi/cmsPackagist | <= 2.1.1 | — |
Affected products
2- Feehi/CMSdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-25q6-m425-9fqrghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2022-34140ghsaADVISORY
- packetstormsecurity.com/files/168012/Feehi-CMS-2.1.1-Cross-Site-Scripting.htmlghsax_refsource_MISCWEB
- packetstormsecurity.com/files/168476/Feehi-CMS-2.1.1-Remote-Code-Execution.htmlmitrex_refsource_MISC
- github.com/liufee/cms/issues/61ghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.