VYPR
Moderate severityNVD Advisory· Published Oct 24, 2024· Updated Oct 24, 2024

baserCMS has a Cross-site Scripting (XSS) Vulnerability in Edit Email Form Settings Feature

CVE-2024-46998

Description

baserCMS is a website development framework. Versions prior to 5.1.2 have a cross-site scripting vulnerability in the Edit Email Form Settings Feature. Version 5.1.2 fixes the issue.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A stored cross-site scripting (XSS) vulnerability in baserCMS's Edit Email Form Settings feature allows authenticated attackers to inject arbitrary scripts via the admin panel.

Vulnerability

Overview

CVE-2024-46998 is a stored cross-site scripting vulnerability in the Edit Email Form Settings feature of baserCMS, a PHP and CakePHP-based website development framework. The vulnerability affects baserCMS 5 series versions prior to 5.1.2. According to the official advisory, the issue stems from improper handling of input data in the email form settings interface, enabling an attacker to store malicious scripts that execute when an administrator views the affected page [2].

Exploitation

Prerequisites

To exploit this vulnerability, an attacker must have authenticated access to the management screen. The advisory notes that this vulnerability only requires a response if the management screen is used by an unspecified number of users (e.g., multiple administrators or contributors) [2]. No additional privileges beyond those required to access the email form settings are necessary, making it particularly dangerous in environments with shared administrative access.

Impact

Successful exploitation could allow an attacker to execute arbitrary scripts in the browser of any user viewing the compromised email form settings page. This can lead to session hijacking, defacement, or theft of sensitive data handled within the admin context. The stored nature of the XSS means the malicious payload persists across sessions until manually removed [2].

Mitigation

The vendor has released baserCMS version 5.1.2 which fixes this vulnerability [1]. Users are strongly advised to update to this latest version. No workarounds are mentioned; the only recommended action is upgrading [2].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
baserproject/basercmsPackagist
< 5.1.25.1.2

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.