VYPR
Low severity2.4NVD Advisory· Published Apr 26, 2026· Updated Apr 29, 2026

CVE-2026-7014

CVE-2026-7014

Description

A flaw has been found in MaxSite CMS up to 109.3. This vulnerability affects unknown code of the component down_count Plugin. This manipulation of the argument f_file/f_prefix causes cross site scripting. The attack may be initiated remotely. The exploit has been published and may be used. Upgrading to version 109.4 is able to resolve this issue. Patch name: 8a3946bd0a54bfb72a4d57179fcd253f2c550cd7. The affected component should be upgraded. The vendor was informed early about this issue. They classify it as a "Self-XSS". They deployed a countermeasure: "Nevertheless, we consider this a violation of secure coding standards. The lack of filtering via htmlspecialchars() has already been fixed in the latest patch to prevent incorrect data display."

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A stored cross-site scripting (Self-XSS) vulnerability in the down_count plugin of MaxSite CMS up to 109.3 allows remote attackers to inject malicious scripts via unfiltered f_file/f_prefix parameters.

Vulnerability

Overview A stored cross-site scripting (XSS) vulnerability exists in the down_count plugin of MaxSite CMS versions up to 109.3. The root cause is the absence of output encoding with htmlspecialchars() when handling the f_file and f_prefix arguments, as confirmed by the vendor's own assessment [1]. This lack of sanitization allows an attacker to inject arbitrary HTML or JavaScript into the plugin's interface.

Exploitation

Path An attacker can initiate the attack remotely by crafting a malicious payload in the f_file or f_prefix parameter [1]. Since the parameter values are stored and later displayed without proper escaping, the injected script executes in the context of the affected admin page. The vendor classifies this as 'Self-XSS', meaning the attacker must trick an authenticated administrator into visiting a specially crafted link or submit the payload themselves [1].

Impact

Successful exploitation results in the execution of attacker-controlled scripts within the browser session of the administrator, potentially leading to unauthorized actions, data theft, or configuration changes under the admin's privileges. The CVSS v3 base score of 2.4 (Low) reflects the need for user interaction and the limited scope of self-XSS [CVE description].

Mitigation

The issue is addressed in version 109.4, which applies htmlspecialchars() to the affected parameters [1]. Users are advised to upgrade to the latest version [2]. A patch identified by commit hash 8a3946bd0a54bfb72a4d57179fcd253f2c550cd7 is available in the official repository [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.