CVE-2026-7013
Description
A security vulnerability has been detected in MaxSite CMS up to 109.3. Affected by this issue is some unknown functionality of the component mail_send Plugin. The manipulation of the argument f_subject/f_files/f_from leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. Upgrading to version 109.4 can resolve this issue. The identifier of the patch is 8a3946bd0a54bfb72a4d57179fcd253f2c550cd7. It is advisable to upgrade the affected component. The vendor was informed early about this issue. They classify it as a "Self-XSS". They deployed a countermeasure: "Nevertheless, we consider this a violation of secure coding standards. The lack of filtering via htmlspecialchars() has already been fixed in the latest patch to prevent incorrect data display."
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
MaxSite CMS up to 109.3 has a stored XSS vulnerability in the mail_send plugin via unsanitized f_subject, f_files, and f_from parameters.
Vulnerability
Overview
CVE-2026-7013 is a stored cross-site scripting (XSS) vulnerability found in MaxSite CMS versions up to 109.3. The issue resides in the mail_send plugin, where the parameters f_subject, f_files, and f_from are not properly sanitized before being processed. The vendor classifies this as a "Self-XSS" and states that the lack of filtering via htmlspecialchars() has been fixed in the latest patch [1].
Exploitation
An attacker can exploit this vulnerability remotely by crafting malicious input in the affected parameters of the mail_send plugin. The attack does not require authentication, as the plugin's functionality is accessible to unauthenticated users. The exploit has been publicly disclosed, increasing the risk of active exploitation [4].
Impact
Successful exploitation allows an attacker to inject arbitrary JavaScript code into the application's context. Since this is classified as a Self-XSS, the injected script would execute in the context of the victim's session, potentially leading to data theft, session hijacking, or other client-side attacks. The CVSS v3 score of 2.4 reflects the low severity due to the self-XSS nature, but the public availability of exploit details elevates the practical risk.
Mitigation
The vulnerability is patched in MaxSite CMS version 109.4. The fix involves adding htmlspecialchars() to sanitize the f_logging_file parameter, which addresses the root cause of the XSS [1]. Users are strongly advised to upgrade to version 109.4 or apply the patch commit 8a3946bd0a54bfb72a4d57179fcd253f2c550cd7 [1]. No workarounds have been provided by the vendor.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6News mentions
0No linked articles in our index yet.