CVE-2023-43828
Description
A Cross-site scripting (XSS) vulnerability in /panel/languages/ of Subrion v4.2.1 allow attackers to execute arbitrary web scripts or HTML via a crafted payload injected into 'Title' parameter.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A stored XSS vulnerability in Subrion CMS 4.2.1 allows attackers to inject arbitrary JavaScript via the 'Title' parameter on the languages page.
Vulnerability
Overview
CVE-2023-43827 describes a stored cross-site scripting (XSS) vulnerability found in Subrion CMS version 4.2.1. The flaw resides in the /panel/languages/ administrative interface, where the 'Title' parameter is not properly sanitized before being stored and later displayed. An attacker can inject arbitrary HTML or JavaScript code into this field, which will then be executed in the browser of any user who views the affected languages page [1][2].
Exploitation
Prerequisites
Exploitation requires an authenticated administrator-level account, as the languages panel is part of the backend administration area. The attacker must have access to modify language entries; once injected, the malicious payload is stored on the server and triggers every time the page is loaded by other administrators or users with sufficient privileges [1]. No other specialized network position is required beyond being able to reach the admin panel.
Impact
A successful attack can lead to session hijacking, credential theft, or the execution of arbitrary actions within the context of the victim's admin session. Since the XSS is stored, it can affect multiple users over time, making it a persistent threat to the confidentiality and integrity of the Subrion instance [2].
Mitigation
Status
Subrion CMS is an open-source project that appears to be no longer actively maintained; the latest release is 4.2.1, and no official patch has been issued for this vulnerability [3]. As a result, affected users should consider removing the vulnerable application from production environments or implementing strict Content Security Policy (CSP) headers and input validation filters as workarounds.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
intelliants/subrionPackagist | <= 4.2.1 | — |
Affected products
2- Subrion/Subriondescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/advisories/GHSA-4w2j-wj9q-6wpxghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-43828ghsaADVISORY
News mentions
0No linked articles in our index yet.