VYPR
Moderate severityNVD Advisory· Published Oct 19, 2023· Updated Sep 12, 2024

CVE-2023-43875

CVE-2023-43875

Description

Multiple Cross-Site Scripting (XSS) vulnerabilities in installation of Subrion CMS v.4.2.1 allows a local attacker to execute arbitrary web scripts via a crafted payload injected into the dbhost, dbname, dbuser, adminusername and adminemail.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Subrion CMS 4.2.1 installation wizard contains multiple reflected XSS vulnerabilities in five input fields, allowing a local attacker to inject arbitrary JavaScript.

Vulnerability

Description

Multiple Cross-Site Scripting (XSS) vulnerabilities exist in the installation wizard of Subrion CMS version 4.2.1. The root cause is insufficient sanitization of user-supplied input in the dbhost, dbname, dbuser, adminusername, and adminemail fields during the setup process [1][3]. This allows an attacker to inject arbitrary web scripts or HTML.

Exploitation

An attacker with local access to the installation page can craft a payload (e.g., '><svg/onload=alert('XSS')>) and submit it in any of the five vulnerable fields. Upon clicking the "Next" button, the injected script executes in the context of the installation page [3]. No authentication is required as the vulnerability occurs before the CMS is fully installed.

Impact

Successful exploitation enables arbitrary JavaScript execution, which could be used to steal session cookies, redirect users to malicious sites, or perform actions on behalf of the victim within the installation interface. Although the attacker is described as "local," the installation page is typically accessed via a web browser, so any user who can reach the setup URL can trigger the XSS [1].

Mitigation

As of the publication date (2023-10-19), no official patch has been released for Subrion CMS 4.2.1 [2]. Users should restrict access to the installation wizard to trusted administrators only and consider removing or protecting the installation directory after setup. Upgrading to a newer version, if available, may also address the issue.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
intelliants/subrionPackagist
<= 4.2.1

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.