VYPR
Moderate severityNVD Advisory· Published Jul 13, 2023· Updated Oct 30, 2024

CVE-2023-37785

CVE-2023-37785

Description

A cross-site scripting (XSS) vulnerability in ImpressCMS v1.4.5 and before allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the smile_code parameter of the component /editprofile.php.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A stored XSS vulnerability in ImpressCMS 1.4.5 and earlier allows an attacker to inject arbitrary web scripts via the smile_code parameter on /editprofile.php.

Vulnerability

Description

A cross-site scripting (XSS) vulnerability exists in ImpressCMS versions 1.4.5 and earlier. The root cause is insufficient sanitization of the smile_code parameter passed to the /editprofile.php component [1]. An attacker can store a malicious payload, such as "\'>, into this parameter [3].

Exploitation

Path

An attacker must first have administrator-level access to the ImpressCMS administration panel [3]. By navigating to Administration Menu > Smilies and editing a smile entry, the attacker can intercept the form submission and modify the smile_code value. The crafted payload is then stored in the database. When any user visits their own profile edit page (/editprofile.php), the injected script executes because the stored value is rendered without proper output encoding [3].

Impact

Successful exploitation allows the attacker to execute arbitrary web scripts or HTML in the context of a victim user's browser session, leading to potential session hijacking, credential theft, or defacement. Since the attack is stored, the payload is triggered each time an affected user accesses the profile editing page [1][3].

Mitigation

The ImpressCMS project has addressed this issue in later versions. Users should upgrade to a patched release (e.g., ImpressCMS 2.0.3 or newer) that properly sanitizes the smile_code parameter [2]. No official workaround has been documented, but applying proper input validation and output encoding at the application level can mitigate the risk until an upgrade is performed.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
impresscms/impresscmsPackagist
<= 1.4.5

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.