VYPR
Moderate severityNVD Advisory· Published Nov 9, 2022· Updated May 1, 2025

CVE-2022-43320

CVE-2022-43320

Description

FeehiCMS v2.1.1 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the id parameter at /web/admin/index.php?r=log%2Fview-layer.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

FeehiCMS v2.1.1 contains a reflected XSS vulnerability in the log view-layer endpoint via the `id` parameter, allowing unauthenticated attackers to inject arbitrary JavaScript.

Vulnerability

FeehiCMS v2.1.1, a Yii2-based content management system, suffers from a reflected cross-site scripting (XSS) vulnerability in the admin log view-layer functionality. The flaw resides in the /web/admin/index.php?r=log%2Fview-layer endpoint, where the id parameter is not properly sanitized before being rendered in the response.[1][2]

Exploitation

An attacker can exploit this by crafting a malicious URL containing a payload in the id parameter. For instance, appending %3Csvg%20onload=alert(20221014)%3E (URL-encoded ``) causes the stored XSS payload to execute when an authenticated administrator views a log entry. The page automatically loads and triggers the injected script without requiring any user interaction beyond visiting the crafted link.[3]

Impact

Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of the victim's browser session. This could lead to session hijacking, credential theft, defacement, or other malicious actions under the admin's privileges. The attack requires no prior authentication, as the vulnerability is triggered when an admin user accesses the malicious link.

Mitigation

As of the advisory date, the vendor had not released a patch for this vulnerability. Users are advised to apply input validation and output encoding for the id parameter or, if possible, restrict access to the affected endpoint to trusted administrators. No workaround is documented in the vendor's repository or issue tracker.[2][3]

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
feehi/cmsPackagist
<= 2.1.1

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.