CVE-2026-4510
Description
A weakness has been identified in PbootCMS up to 3.2.12. This impacts the function alert_location of the file apps/home/controller/MemberController.php of the component Parameter Handler. This manipulation of the argument backurl causes cross site scripting. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
PbootCMS 3.2.12's member login flow reflects the backurl parameter into JavaScript without proper encoding, enabling reflected XSS and open redirect via crafted URLs.
Root
Cause A weakness in PbootCMS up to version 3.2.12 allows a malicious actor to supply a crafted backurl parameter to the member login endpoint. The alert_location() function in core/function/helper.php directly embeds this user-controlled value into a JavaScript string assigned to location.href, without context-aware output encoding. The vulnerable code path is located in apps/home/controller/MemberController.php [1].
Attack
Surface An unauthenticated attacker can exploit this by sending a victim a link to /member/login?backurl=... with a specially crafted value. Because the backurl is inserted into a JavaScript context without escaping special characters like double quotes and semicolons, the attacker can break out of the string and inject arbitrary JavaScript. This is a reflected (non-persistent) attack that requires user interaction (clicking the crafted link) [1].
Impact
Successful exploitation allows the attacker to execute arbitrary JavaScript in the victim's browser within the context of the PbootCMS site. This can be used to steal session cookies, perform phishing by redirecting the victim to a malicious site (open redirect), or deface the page. The reference report classifies this as CWE-79 (Cross-Site Scripting) and CWE-601 (URL Redirection to Untrusted Site), assigning a CVSS v3 base score of 6.1 (Medium/High) [1].
Mitigation
At the time of disclosure, no official patch has been released for PbootCMS 3.2.12. Administrators should sanitize the backurl parameter by validating it against a whitelist of allowed hosts and encoding the output for the JavaScript context. Until a vendor fix is available, upgrading to a newer version or applying a web application firewall (WAF) rule that blocks malicious payloads in the backurl parameter is recommended [1].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: <=3.2.12
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.