CVE-2023-37785
Description
A cross-site scripting (XSS) vulnerability in ImpressCMS v1.4.5 and before allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the smile_code parameter of the component /editprofile.php.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A stored XSS vulnerability in ImpressCMS 1.4.5 and earlier allows an attacker to inject arbitrary web scripts via the smile_code parameter on /editprofile.php.
Vulnerability
Description
A cross-site scripting (XSS) vulnerability exists in ImpressCMS versions 1.4.5 and earlier. The root cause is insufficient sanitization of the smile_code parameter passed to the /editprofile.php component [1]. An attacker can store a malicious payload, such as "\'>, into this parameter [3].
Exploitation
Path
An attacker must first have administrator-level access to the ImpressCMS administration panel [3]. By navigating to Administration Menu > Smilies and editing a smile entry, the attacker can intercept the form submission and modify the smile_code value. The crafted payload is then stored in the database. When any user visits their own profile edit page (/editprofile.php), the injected script executes because the stored value is rendered without proper output encoding [3].
Impact
Successful exploitation allows the attacker to execute arbitrary web scripts or HTML in the context of a victim user's browser session, leading to potential session hijacking, credential theft, or defacement. Since the attack is stored, the payload is triggered each time an affected user accesses the profile editing page [1][3].
Mitigation
The ImpressCMS project has addressed this issue in later versions. Users should upgrade to a patched release (e.g., ImpressCMS 2.0.3 or newer) that properly sanitizes the smile_code parameter [2]. No official workaround has been documented, but applying proper input validation and output encoding at the application level can mitigate the risk until an upgrade is performed.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
impresscms/impresscmsPackagist | <= 1.4.5 | — |
Affected products
2- ImpressCMS/ImpressCMSdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/advisories/GHSA-667r-p4gg-7m2qghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-37785ghsaADVISORY
News mentions
0No linked articles in our index yet.