CVE-2023-44771
Description
A Cross-Site Scripting (XSS) vulnerability in Zenario CMS v.9.4.59197 allows a local attacker to execute arbitrary code via a crafted script to the Page Layout.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Zenario CMS 9.4.59197 is vulnerable to stored cross-site scripting in the Page Layout editor, allowing an attacker with admin access to inject arbitrary JavaScript that executes when the page is viewed.
Vulnerability
Details
A stored cross-site scripting (XSS) vulnerability exists in Zenario CMS version 9.4.59197. The root cause is insufficient sanitization of user-supplied input in the Page Layout editing functionality. An attacker can embed a malicious script, such as ``, into a page layout. This payload is then executed in the browser of any administrator who visits the affected page, because the application fails to neutralize the HTML/JavaScript code before rendering it [1][3].
Exploitation
The attack requires an authenticated user with administrative privileges to access the Page Layout editor via the administration menu. The attacker crafts a payload and inserts it into the layout. No special network position is needed beyond access to the admin panel. The stored script persists in the layout and executes automatically when other administrators load the page [3].
Impact
Successful exploitation enables an attacker to execute arbitrary JavaScript in the context of the Zenario admin interface. This can lead to session hijacking, defacement, theft of sensitive administrative data, or further lateral movement within the CMS. The vulnerability does not directly compromise the server, but it undermines the security of the administrative session [1][3].
Mitigation
As of the publication date (October 2023), no patch has been officially released. The vendor's repository indicates the software is open source under a BSD license, and users are advised to apply input validation and output encoding to the Page Layout field manually. Organizations using this version should restrict administrative access to trusted users and monitor for any suspicious activity in the Page Layout settings [2][3].
- NVD - CVE-2023-44771
- GitHub - TribalSystems/Zenario: Zenario is a web-based content management system (CMS) for sites with one or many languages. It is simple to use, and can grow with your requirements.
- GitHub - sromanhu/CVE-2023-44771_ZenarioCMS--Stored-XSS---Page-Layout: Zenariocms 9.4.59197 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload to the Page Layout
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
tribalsystems/zenarioPackagist | <= 9.4.59197 | — |
Affected products
2- Zenario CMS/Zenario CMSdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/advisories/GHSA-6cxv-27r2-fp3mghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-44771ghsaADVISORY
News mentions
0No linked articles in our index yet.