CVE-2026-5249
Description
A vulnerability was found in gougucms 4.08.18. This impacts an unknown function of the file \gougucms-master\app\admin\view\user\record.html of the component Record Endpoint. Performing a manipulation of the argument value.content results in cross site scripting. It is possible to initiate the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A stored XSS vulnerability in gougucms 4.08.18 allows low-privileged users to inject malicious scripts into the admin record endpoint, triggering when an administrator views logs.
Vulnerability
A stored cross-site scripting (XSS) vulnerability exists in gougucms version 4.08.18 within the file \gougucms-master\app\admin\view\user\record.html. The Record Endpoint is vulnerable as user-controlled data from the attribute value.content is directly appended to an HTML string without validation or sanitization. When an administrator views the record management page, the document is passed to $('#logs').append(html), allowing the jQuery library to parse and execute any included HTML or script tags [1].
Exploitation
An attacker with a low-privileged account can inject a malicious payload—such as ` or `—into the record endpoint through a submit form. The payload is stored in the database and automatically executed when an administrator accesses the operational records or logs in the backend dashboard. No special authentication is required beyond a normal user account, and the attack can be performed remotely [1].
Impact
Successful exploitation leads to potential session hijacking and unauthorized administrative actions. Because the script runs in the administrator's browser context, the attacker could steal administrative session cookies or perform actions without consent, effectively compromising the entire application. The published CVSS v3 score from the reference is 8.8 (High) [1].
Mitigation
The vendor was contacted but did not respond, and no patch has been released. Users should apply input sanitization for the value.content field and consider restricting access to the record pages. The exploit has been publicly disclosed, and the vulnerability may be added to CISA KEV in the future [1].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.