CVE-2026-7012
Description
A vulnerability was detected in MaxSite CMS up to 109.3. This affects an unknown part of the component Redirect Plugin. The manipulation of the argument f_all/f_all404 results in cross site scripting. The attack can be launched remotely. The exploit is now public and may be used. Upgrading to version 109.4 is able to mitigate this issue. The patch is identified as 8a3946bd0a54bfb72a4d57179fcd253f2c550cd7. You should upgrade the affected component. The vendor was informed early about this issue. They classify it as a "Self-XSS". They deployed a countermeasure: "Nevertheless, we consider this a violation of secure coding standards. The lack of filtering via htmlspecialchars() has already been fixed in the latest patch to prevent incorrect data display."
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
MaxSite CMS up to 109.3 has a self-XSS in the Redirect Plugin due to missing htmlspecialchars() on f_all/f_all404 parameters.
Vulnerability
Overview
CVE-2026-7012 describes a cross-site scripting (XSS) vulnerability in MaxSite CMS versions up to 109.3, specifically within the Redirect Plugin. The issue stems from insufficient sanitization of the f_all and f_all404 arguments parameters, which are not passed through htmlspecialchars()` before being rendered. The vendor classifies this as a "Self-XSS" and acknowledges it as a violation of secure coding standards [1].
Exploitation
An attacker can exploit this vulnerability remotely without authentication, as the affected parameters are user-controllable inputs in the plugin's admin interface. The attack requires the victim to be logged in as an administrator and to interact with a crafted link or form that injects malicious script into the plugin settings. Since the XSS is self-contained (Self-XSS), the attacker cannot directly target other users unless they trick an admin into executing the payload [4].
Impact
Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of the admin's session. This could lead to unauthorized actions such as modifying site configuration, exfiltrating session cookies, or performing other administrative operations. However, the impact is limited to the admin's own browser session, reducing the overall severity [1][4].
Mitigation
The vulnerability is patched in MaxSite CMS version 109.4, which adds htmlspecialchars() to the output of the f_logging_file parameter in the Redirect Plugin [1]. Users should upgrade to version 109.4 or apply the commit 8a3946bd0a54bfb72a4d57179fcd253f2c550cd7 to mitigate the issue. No workarounds are provided, but the patch is straightforward [2][3].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6News mentions
0No linked articles in our index yet.