CVE-2024-48652
Description
Cross Site Scripting vulnerability in camaleon-cms v.2.7.5 allows remote attacker to execute arbitrary code via the content group name field.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Camaleon CMS 2.7.5 has a stored XSS in the content group name field, allowing remote authenticated attackers to execute arbitrary JavaScript.
Vulnerability
Description Camaleon CMS version 2.7.5 contains a stored Cross-Site Scripting (XSS) vulnerability in the content group name field [1]. The application fails to properly sanitize user-supplied input when creating or editing content groups, allowing an attacker to inject arbitrary HTML and JavaScript code [4].
Exploitation
An attacker with administrative access can exploit this vulnerability by navigating to Settings > Content Groups, selecting an existing group, and editing the name field to include a malicious payload such as "> [4]. After saving, the payload is stored and executed when any user views the affected content group, including other administrators [4].
Impact
Successful exploitation enables the attacker to execute arbitrary JavaScript in the context of the victim's browser. This can lead to session hijacking, data theft, or further attacks such as credential harvesting and unauthorized actions within the CMS [1][4]. The attack is remote and does not require special privileges beyond a valid admin account.
Mitigation
The vendor has not released a patched version as of the publication date [1]. Users are advised to restrict access to the admin panel, apply input validation, and consider upgrading to a newer version if available [2][3]. The vulnerability is publicly documented with proof-of-concept code [4].
- GitHub - owen2345/camaleon-cms: Camaleon CMS is a dynamic and advanced content management system based on Ruby on Rails
- NVD - CVE-2024-48652
- ruby-advisory-db/gems/camaleon_cms/CVE-2024-48652.yml at master · rubysec/ruby-advisory-db
- GitHub - paragbagul111/CVE-2024-48652: Cross Site Scripting vulnerability in camaleon-cms v.2.7.5 allows remote attacker to execute arbitrary code via the content group name field
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
camaleon_cmsRubyGems | <= 2.7.5 | — |
Affected products
2- camaleon-cms/camaleon-cmsdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.