CVE-2024-58296
Description
CE Phoenix v3.0.1 contains a stored cross-site scripting vulnerability in the currencies administration panel that allows attackers to inject malicious scripts. Attackers can insert XSS payloads in the title field to execute arbitrary JavaScript when administrators view the currencies page.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CE Phoenix v3.0.1 has a stored XSS vulnerability in the currencies admin panel, allowing attackers to inject JavaScript via the title field.
Vulnerability
Overview
CE Phoenix v3.0.1 contains a stored cross-site scripting (XSS) vulnerability in the currencies administration panel, specifically in the admin/currencies.php page. The title field does not properly sanitize user input, allowing an attacker to inject arbitrary JavaScript code that is stored and later executed when an administrator views the currencies page [2]. This is a classic example of CWE-79: Improper Neutralization of Input During Web Page Generation.
Exploitation
Details
To exploit this vulnerability, an attacker must first have administrative access to the CE Phoenix admin panel. Once logged in, they navigate to the currencies page, edit a currency entry, and insert a malicious payload into the title field. For example, a payload such as <sVg/onLy=1 onLoaD=confirm(1)// will execute when the page is loaded [3]. The attack requires no special network position beyond access to the admin interface, and the stored script will trigger for any administrator who subsequently views the currencies page.
Impact
Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of the admin panel. This can lead to session hijacking, defacement of the admin interface, or further attacks against other administrators. The CVSS v4 vector (CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N) indicates a medium severity, with low impact on confidentiality and integrity, and no impact on availability [2].
Mitigation
Status
As of the publication date (2025-12-11), no official patch has been released for this vulnerability. Users of CE Phoenix v3.0.1 are advised to apply input validation and output encoding on the title field in admin/currencies.php as a workaround. The vendor has not yet addressed this issue in a subsequent release [2][3].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: = 3.0.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5News mentions
0No linked articles in our index yet.