VYPR
Medium severity6.1NVD Advisory· Published May 8, 2026· Updated May 8, 2026

CVE-2023-42345

CVE-2023-42345

Description

A Cross Site Scripting vulnerability in Alkacon OpenCms before 16 exists via updateModelGroups.jsp.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A stored Cross-Site Scripting (XSS) vulnerability in Alkacon OpenCms before version 16 exists via the updateModelGroups.jsp endpoint.

Vulnerability

Overview

CVE-2023-42345 is a Cross-Site Scripting (XSS) vulnerability in Alkacon OpenCms, an open-source Java content management framework. The flaw resides in the updateModelGroups.jsp page and affects versions prior to OpenCms 16. The root cause is insufficient sanitization of user-supplied input, allowing an attacker to inject arbitrary JavaScript or HTML code that is later executed in the context of a victim's browser [1][2][3][4].

Exploitation and

Attack Surface

To exploit this vulnerability, an attacker must be able to submit crafted input to the updateModelGroups.jsp endpoint. The attack does not require authentication if the endpoint is exposed to unauthenticated users, though in typical deployments some level of access may be needed. The injected payload is stored on the server and subsequently rendered when other users (including administrators) access the affected page, making this a stored XSS attack. The attacker does not need to be on the same network; the attack can be carried out remotely over HTTP [1][2][3][4].

Impact

Successful exploitation allows an attacker to execute arbitrary JavaScript in the browser of any user who views the compromised page. This can lead to session hijacking, theft of sensitive data, defacement, or further attacks against the OpenCms instance and its users. Because the payload is stored, the impact can persist until the malicious input is removed or the vulnerability [1][2][3][4].

Mitigation

Users should upgrade to OpenCms version 16 or later, which contains the fix for this vulnerability. No official workaround has been provided, but restricting access to the updateModelGroups.jsp endpoint and applying input validation can reduce risk. The vulnerability has been published in the GitHub Advisory Database and referenced by NVD [3][4].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.opencms:opencms-coreMaven
< 16.016.0

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.