CVE-2026-7015
Description
A vulnerability has been found in MaxSite CMS up to 109.3. This issue affects some unknown processing of the component Guestbook Plugin. Such manipulation of the argument f_text/f_slug/f_limit/f_email leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 109.4 is capable of addressing this issue. The name of the patch is 8a3946bd0a54bfb72a4d57179fcd253f2c550cd7. It is suggested to upgrade the affected component. The vendor was informed early about this issue. They classify it as a "Self-XSS". They deployed a countermeasure: "Nevertheless, we consider this a violation of secure coding standards. The lack of filtering via htmlspecialchars() has already been fixed in the latest patch to prevent incorrect data display."
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
MaxSite CMS Guestbook Plugin is vulnerable to stored XSS via unsanitized input fields, fixed in version 109.4.
Vulnerability
Overview
CVE-2026-7015 describes a stored cross-site scripting (XSS) vulnerability in the Guestbook Plugin of MaxSite CMS up to version 109.3. The issue arises from insufficient sanitization of user-supplied input passed through parameters such as f_text, f_slug, f_limit, and f_email. The vendor acknowledges this as a violation of secure coding standards, noting that the lack of filtering via htmlspecialchars() has been fixed in the latest patch [1].
Exploitation
An attacker can exploit this vulnerability remotely without requiring authentication, as the Guestbook Plugin is publicly accessible. By crafting malicious JavaScript payloads within the affected parameters, the attacker can inject scripts that are stored on the server and later executed in the browsers of other users viewing the guestbook entries. The exploit has been publicly disclosed, increasing the risk of active exploitation [4].
Impact
Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of a victim's session. This can lead to theft of session cookies, defacement of the guestbook page, or redirection to malicious sites. The vendor classifies this as a "Self-XSS" scenario, but the stored nature of the vulnerability means any visitor to the guestbook could be affected, not just the attacker themselves [1].
Mitigation
The vulnerability is patched in MaxSite CMS version 109.4, which includes the commit 8a3946bd0a54bfb72a4d57179fcd253f2c550cd7 that adds proper output encoding using htmlspecialchars() [1]. Users are strongly advised to upgrade to version 109.4 or later. No workarounds have been provided, and the vendor recommends upgrading the affected component [1].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6News mentions
0No linked articles in our index yet.